Edit tour

Windows Analysis Report
Client.exe

Overview

General Information

Sample name:Client.exe
Analysis ID:1371143
MD5:0b665294ec2063215cdc72c07caa5bce
SHA1:1c2312f39df0b516def74ce8e925c33191275ff3
SHA256:4e01c76200fe5e4cde437fdd12b42c9d2c884018b7f9b89e097ff53ee4e75ec9
Tags:exeQuasarRAT
Infos:

Detection

Quasar
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Quasar RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
Yara detected Generic Downloader
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Client.exe (PID: 6284 cmdline: C:\Users\user\Desktop\Client.exe MD5: 0B665294EC2063215CDC72C07CAA5BCE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{
  "Version": "1.4.1",
  "Host:Port": "91.92.251.28:4782;",
  "SubDirectory": "SubDir",
  "InstallName": "Client.exe",
  "MutexName": "03ac8289-d1ca-4c45-b72e-cb527f9b533f",
  "StartupKey": "Quasar Client Startup",
  "Tag": "Office04",
  "LogDirectoryName": "Logs",
  "ServerSignature": "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",
  "ServerCertificate": "MIIE9DCCAtygAwIBAgIQALUl5g3e3WtgSfBAkdoFFTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDEwMzE2MDkyN1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAl9coRDtcQs+vmKaPpQq6qQdY4I4ECEoiO2tEK5XToAtrdU6A62WefXPP/tQCV5d/H0PhSaHJk/5x4Q0iWLFuB815nHfXeVIX9qiPtBjra7+ttsxusYmbpOLfAYmUEkucxTLsCqU6aTb9sbRrtdB5jMlBcppRkxodVXxICK/mtceUYJlSTundrWycSdspWlhSq7OeSw9NMYokX0jGaacsNotjpdrpMebctUQoUPzOd6fO7/zHITnqUWBbJl6Zq8yLkZKvaX/NRAyMWQksiScyaLlVkJ88Hetej5yeZtSw3JkLwaF1s4e30w/OZTMD00XjZo0sEg3wp/Vi49ntSbwfcR0kV4uO4H7od62cvyuunOT+vGxlYEsz1pDBwFS56/joOaoDPI150UW3Rv6nCqobOljBHLw8dGTZ83tDLNFFVE3zjGsge5qDmFxH+U6UeueNTfv0gI0PL/jz9Qp8/EB4WU5gp1DppHKzJVF45tDpft/BH7MEBwwhuuYpTzfvf7D7xw9yICmxfvaVHPGe0n5dOsZYrbKJk3711z80o6n5bTpDy6860X8cCURcIIQ0dgXnqK501Bt+8xMk9SHhnCf7dsWa3JbhkZxkOMJ5l4o09GKoan6Rm6bcTaaVOejDaYzkPqsiDROJm11Jenr4NLLOUDyvQnQ2uKxeyTVdFb8ftvMCAwEAAaMyMDAwHQYDVR0OBBYEFMuyx4khnBYLaPrNcAnPTSv+lnE9MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAE7wTWcDGvkb+PXWjj+u5fLUbp8RmXTBZdIT8Vwlktq+DlerWvbXG1KKkP7OysbKdAE7lnezleA5a2JnpiaAbHxmg7I0UAtB+8oElkF0srvURJkihakMn0Dt2PRLcMGu7Ssmwfv9srQmwuy6RtoKUslaqhEC3+ZEN1hQ+rMiOLf2sJoDdNKBeUx4Oiuof6c81MOIxesmls9IWyZ92ZRT/pQU6ECtLsu70caAg/2fRxxMDic5/mOOzUSTGFrEgvXHljxvJVsvd+KdjKoaaBJTJ3IS2d3d7o9uBsJ1m7dENdWbTmFSvXWSMa9TpNnqeYO3vPb52JJXkwhSimcKMpeYxNJNnBFj/ATSoWICr4dtCLsALLuu0encOfmNYmoYmRrKA5+Tz5DZNQ7q1P93B9gn2gw+qQ7FJrHHEXpJamccPraofVFEs+0gIPD+MIjrhoj4cxgCPK053bgV6fkkvU59wEj/S2bWf9wVgoQ8nvL0K0olZbGVKt/b62BuwiRiplAXGFB1rhv8aXs7c0Lb/kQDp24951IBlaLTfdPJkwPp96IVSUtBRP6SO9FAjRSVA8e9phl26q4DmQgEnK/U0EXMJjDmGKMs/Hv7UzIUjXKPDeLdogmjzZJad+MA5YQQ87XesVpdNy3Ga+4yypslZq94fo9Fq9nRzUImtpVmaOFD2Ng+"
}
SourceRuleDescriptionAuthorStrings
Client.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    Client.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      Client.exeMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
      • 0x28ee9d:$x1: Quasar.Common.Messages
      • 0x29f1c6:$x1: Quasar.Common.Messages
      • 0x2ab80e:$x4: Uninstalling... good bye :-(
      • 0x2ad003:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
      Client.exeINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
      • 0x2aadc0:$f1: FileZilla\recentservers.xml
      • 0x2aae00:$f2: FileZilla\sitemanager.xml
      • 0x2aae42:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
      • 0x2ab08e:$b1: Chrome\User Data\
      • 0x2ab0e4:$b1: Chrome\User Data\
      • 0x2ab3bc:$b2: Mozilla\Firefox\Profiles
      • 0x2ab4b8:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2fd43c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
      • 0x2ab610:$b4: Opera Software\Opera Stable\Login Data
      • 0x2ab6ca:$b5: YandexBrowser\User Data\
      • 0x2ab738:$b5: YandexBrowser\User Data\
      • 0x2ab40c:$s4: logins.json
      • 0x2ab142:$a1: username_value
      • 0x2ab160:$a2: password_value
      • 0x2ab44c:$a3: encryptedUsername
      • 0x2fd380:$a3: encryptedUsername
      • 0x2ab470:$a4: encryptedPassword
      • 0x2fd39e:$a4: encryptedPassword
      • 0x2fd31c:$a5: httpRealm
      Client.exeMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
      • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
      • 0x2ab8f8:$s3: Process already elevated.
      • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
      • 0x278c58:$s5: GetKeyloggerLogsDirectory
      • 0x29e925:$s5: GetKeyloggerLogsDirectory
      • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
      • 0x2fea6a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1647837014.0000000001050000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
        00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
          00000000.00000000.1647508938.0000000000D32000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            Process Memory Space: Client.exe PID: 6284JoeSecurity_QuasarYara detected Quasar RATJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.Client.exe.d30000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
                0.0.Client.exe.d30000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  0.0.Client.exe.d30000.0.unpackMAL_QuasarRAT_May19_1Detects QuasarRAT malwareFlorian Roth
                  • 0x28ee9d:$x1: Quasar.Common.Messages
                  • 0x29f1c6:$x1: Quasar.Common.Messages
                  • 0x2ab80e:$x4: Uninstalling... good bye :-(
                  • 0x2ad003:$xc2: 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20 ...
                  0.0.Client.exe.d30000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                  • 0x2aadc0:$f1: FileZilla\recentservers.xml
                  • 0x2aae00:$f2: FileZilla\sitemanager.xml
                  • 0x2aae42:$f3: SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
                  • 0x2ab08e:$b1: Chrome\User Data\
                  • 0x2ab0e4:$b1: Chrome\User Data\
                  • 0x2ab3bc:$b2: Mozilla\Firefox\Profiles
                  • 0x2ab4b8:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2fd43c:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x2ab610:$b4: Opera Software\Opera Stable\Login Data
                  • 0x2ab6ca:$b5: YandexBrowser\User Data\
                  • 0x2ab738:$b5: YandexBrowser\User Data\
                  • 0x2ab40c:$s4: logins.json
                  • 0x2ab142:$a1: username_value
                  • 0x2ab160:$a2: password_value
                  • 0x2ab44c:$a3: encryptedUsername
                  • 0x2fd380:$a3: encryptedUsername
                  • 0x2ab470:$a4: encryptedPassword
                  • 0x2fd39e:$a4: encryptedPassword
                  • 0x2fd31c:$a5: httpRealm
                  0.0.Client.exe.d30000.0.unpackMALWARE_Win_QuasarStealerDetects Quasar infostealerditekshen
                  • 0x164f16:$s1: PGma.System.MouseKeyHook, Version=5.6.130.0, Culture=neutral, PublicKeyToken=null
                  • 0x2ab8f8:$s3: Process already elevated.
                  • 0x28eb9c:$s4: get_PotentiallyVulnerablePasswords
                  • 0x278c58:$s5: GetKeyloggerLogsDirectory
                  • 0x29e925:$s5: GetKeyloggerLogsDirectory
                  • 0x28ebbf:$s6: set_PotentiallyVulnerablePasswords
                  • 0x2fea6a:$s7: BQuasar.Client.Extensions.RegistryKeyExtensions+<GetKeyValues>
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Client.exeAvira: detected
                  Source: Client.exeMalware Configuration Extractor: Quasar {"Version": "1.4.1", "Host:Port": "91.92.251.28:4782;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "03ac8289-d1ca-4c45-b72e-cb527f9b533f", "StartupKey": "Quasar Client Startup", "Tag": "Office04", "LogDirectoryName": "Logs", "ServerSignature": "MHzZqa1Cf1Ktc4+k027v1ASX2rCJ79fJwtL1kIuUQ651qhf26AIY+ZOtlfSSBqH3FsuJXqGaEar5RIcikwbWp+MOnUAwVXtNWFmtYdYmgXROlaQuy/VQ7GlJL1UDeFRya72NbPMCbqbHnOiwfxAPEmA0aPDkNYSiqH/3Gq7EaFY35DbBM43E8QufFfz0IR7Y/gkP6EVNSiFqe5egBwfiLKwB0KVF1dJ6U0KMDNl2aXXray2dLQanlrt/46qbNAf5K0xVp86ImHJlb/tUjDcjpuyoLguaEYeBqNNDZFReRyZIUhTDpPcuq/h1AYpeVi6A1ojQiYhlMbKngfoGK0ISlNezDg0yIf1rIEbhM2j9Ap2WK1+AwX5O6f7IpFID/ENeEoyOqknYD91S3eNCDkS8UE2Zd0J5Zj/7Hnidazu6hvbJy8TsKpV6Q7sqP20AYa3jhlb4XHrUcJw8VGWMCEY6Vg2W3nKy4Bx08XnE17IuvQ/ATD3MAYlIoIZUuyu4NT2h/evXF+AgTYz97yXjA5zvKEU4GPo81QmJCI5VZDTixJijylaeRhls/5vfLM6ty1KYZijsDP4uFOp2Xoec5t6VUGOAOQ5Dpama+DBk67GczHGQ6JpQJFSS7FLzSUCjK2ScVm3EEPsEUw/exvri5XE92B6ARA8OoL7O/asLk8TT7yk=", "ServerCertificate": "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"}
                  Source: Client.exeReversingLabs: Detection: 75%
                  Source: Client.exeVirustotal: Detection: 79%Perma Link
                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1647837014.0000000001050000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1647508938.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6284, type: MEMORYSTR
                  Source: Client.exeJoe Sandbox ML: detected
                  Source: Client.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Client.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 91.92.251.28
                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.4:49729 -> 91.92.251.28:4782
                  Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: unknownTCP traffic detected without corresponding DNS query: 91.92.251.28
                  Source: Client.exe, 00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Client.exeString found in binary or memory: https://api.ipify.org/
                  Source: Client.exeString found in binary or memory: https://ipwho.is/
                  Source: Client.exeString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: Client.exeString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: Client.exeString found in binary or memory: https://stackoverflow.com/q/2152978/23354sCannot

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1647837014.0000000001050000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1647508938.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6284, type: MEMORYSTR

                  System Summary

                  barindex
                  Source: Client.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: Client.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: Client.exe, type: SAMPLEMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                  Source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar infostealer Author: ditekshen
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD45BE10_2_00007FFD9BD45BE1
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD493C10_2_00007FFD9BD493C1
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD44DC60_2_00007FFD9BD44DC6
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD4A7CD0_2_00007FFD9BD4A7CD
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD48A610_2_00007FFD9BD48A61
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD410FA0_2_00007FFD9BD410FA
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD410D10_2_00007FFD9BD410D1
                  Source: Client.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Client.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: Client.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: Client.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                  Source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarStealer author = ditekshen, description = Detects Quasar infostealer, clamav_sig = MALWARE.Win.Trojan.QuasarStealer
                  Source: classification engineClassification label: mal96.troj.evad.winEXE@1/0@0/1
                  Source: C:\Users\user\Desktop\Client.exeMutant created: \Sessions\1\BaseNamedObjects\Local\03ac8289-d1ca-4c45-b72e-cb527f9b533f
                  Source: Client.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Client.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\Client.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\b8493bec853ac702d2188091d76ccffa\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Client.exeReversingLabs: Detection: 75%
                  Source: Client.exeVirustotal: Detection: 79%
                  Source: Client.exeString found in binary or memory: HasSubValue3Conflicting item/add type
                  Source: C:\Users\user\Desktop\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                  Source: Client.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Client.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: Client.exeStatic file information: File size 3266048 > 1048576
                  Source: Client.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x31c600
                  Source: Client.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BADCB4F pushfd ; ret 0_2_00007FFD9BADCB52
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BADBB3C push edx; ret 0_2_00007FFD9BADBA82
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BADBA84 push esp; ret 0_2_00007FFD9BADBAA2
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BADBACC push edx; ret 0_2_00007FFD9BADBA82
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BADBAA4 push esi; ret 0_2_00007FFD9BADBACA
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BAD8163 push ebx; ret 0_2_00007FFD9BAD816A
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BADB9B4 push edx; ret 0_2_00007FFD9BADBA82
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BAD00BD pushad ; iretd 0_2_00007FFD9BAD00C1
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BAD7569 push ebx; iretd 0_2_00007FFD9BAD756A
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD42C10 push eax; ret 0_2_00007FFD9BD42BFC
                  Source: C:\Users\user\Desktop\Client.exeCode function: 0_2_00007FFD9BD42A42 push eax; ret 0_2_00007FFD9BD42BFC

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\Client.exeFile opened: C:\Users\user\Desktop\Client.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: Client.exe, 00000000.00000002.2907860296.000000001BCE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.C
                  Source: C:\Users\user\Desktop\Client.exeProcess token adjusted: DebugJump to behavior
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\Client.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeQueries volume information: C:\Users\user\Desktop\Client.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.SqlXml\v4.0_4.0.0.0__b77a5c561934e089\System.Data.SqlXml.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Client.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1647837014.0000000001050000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1647508938.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6284, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Client.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Client.exe.d30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1647837014.0000000001050000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000000.1647508938.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Client.exe PID: 6284, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                  Valid Accounts2
                  Command and Scripting Interpreter
                  Path InterceptionPath Interception1
                  Disable or Modify Tools
                  OS Credential Dumping1
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Hidden Files and Directories
                  LSASS Memory1
                  File and Directory Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                  Non-Standard Port
                  SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                  Domain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Obfuscated Files or Information
                  Security Account Manager12
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                  Application Layer Protocol
                  Data Encrypted for ImpactDNS ServerEmail Addresses
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1371143 Sample: Client.exe Startdate: 08/01/2024 Architecture: WINDOWS Score: 96 11 Found malware configuration 2->11 13 Malicious sample detected (through community Yara rule) 2->13 15 Antivirus / Scanner detection for submitted sample 2->15 17 5 other signatures 2->17 5 Client.exe 8 2->5         started        process3 dnsIp4 9 91.92.251.28, 4782 THEZONEBG Bulgaria 5->9 19 Hides that the sample has been downloaded from the Internet (zone.identifier) 5->19 signatures5

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Client.exe76%ReversingLabsByteCode-MSIL.Trojan.Quasar
                  Client.exe80%VirustotalBrowse
                  Client.exe100%AviraHEUR/AGEN.1307453
                  Client.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://ipwho.is/0%VirustotalBrowse
                  91.92.251.280%Avira URL Cloudsafe
                  91.92.251.281%VirustotalBrowse
                  https://ipwho.is/0%Avira URL Cloudsafe

                  Download Network PCAP: filteredfull

                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  91.92.251.28true
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/Client.exefalse
                    high
                    https://stackoverflow.com/q/14436606/23354Client.exefalse
                      high
                      https://stackoverflow.com/q/2152978/23354sCannotClient.exefalse
                        high
                        https://ipwho.is/Client.exefalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameClient.exe, 00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/11564914/23354;Client.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            91.92.251.28
                            unknownBulgaria
                            34368THEZONEBGtrue
                            Joe Sandbox version:38.0.0 Ammolite
                            Analysis ID:1371143
                            Start date and time:2024-01-08 11:01:07 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 55s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Client.exe
                            Detection:MAL
                            Classification:mal96.troj.evad.winEXE@1/0@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 61
                            • Number of non-executed functions: 2
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            THEZONEBGSecuriteInfo.com.Win32.TrojanX-gen.31521.10259.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 91.92.253.149
                            WEXTRACT.EXE.exeGet hashmaliciousRHADAMANTHYSBrowse
                            • 91.92.245.204
                            Jw45oL7Dqh.exeGet hashmaliciousPureLog StealerBrowse
                            • 91.92.241.244
                            C14AkzrXP2.exeGet hashmaliciousRHADAMANTHYSBrowse
                            • 91.92.245.204
                            Framework.exeGet hashmaliciousRHADAMANTHYSBrowse
                            • 91.92.245.204
                            vHihz5bxaP.exeGet hashmaliciousNjratBrowse
                            • 91.92.250.243
                            twointe.exeGet hashmaliciousUnknownBrowse
                            • 91.92.254.7
                            twointe.exeGet hashmaliciousUnknownBrowse
                            • 91.92.254.7
                            1ceRxDhQNT.exeGet hashmaliciousAsyncRATBrowse
                            • 91.92.250.243
                            DyNsfeutFQ.exeGet hashmaliciousFabookie, Glupteba, SmokeLoader, Stealc, VidarBrowse
                            • 91.92.254.7
                            file.exeGet hashmaliciousRedLine, XmrigBrowse
                            • 91.92.251.179
                            Had.exeGet hashmaliciousPetite VirusBrowse
                            • 91.92.254.7
                            InstallSetup3.exeGet hashmaliciousStealc, VidarBrowse
                            • 91.92.254.7
                            InstallSetup2.exeGet hashmaliciousPetite VirusBrowse
                            • 91.92.254.7
                            file.exeGet hashmaliciousUnknownBrowse
                            • 91.92.254.7
                            170iHJWEj3.exeGet hashmaliciousGlupteba, Stealc, VidarBrowse
                            • 91.92.254.7
                            file.exeGet hashmaliciousRedLineBrowse
                            • 91.92.245.15
                            file.exeGet hashmaliciousUnknownBrowse
                            • 91.92.254.7
                            xgWw2DJAn8.exeGet hashmaliciousUnknownBrowse
                            • 91.92.254.7
                            xgWw2DJAn8.exeGet hashmaliciousUnknownBrowse
                            • 91.92.254.7
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):6.083588221813721
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:Client.exe
                            File size:3'266'048 bytes
                            MD5:0b665294ec2063215cdc72c07caa5bce
                            SHA1:1c2312f39df0b516def74ce8e925c33191275ff3
                            SHA256:4e01c76200fe5e4cde437fdd12b42c9d2c884018b7f9b89e097ff53ee4e75ec9
                            SHA512:3c56ab85b5732dd2cd0dabdd4e78065665f55a2a5ba3a686c083fd4e91ddd4c7b401d089c0881ac4188c4911aa9ec62dd3715c5a2cae19f525c52f59074c919a
                            SSDEEP:49152:PvbI22SsaNYfdPBldt698dBcjHXYRJ6pbR3LoGdKTHHB72eh2NT:Pvk22SsaNYfdPBldt6+dBcjHXYRJ6r
                            TLSH:59E56B143BF85E27E1BBE277A5B0041267F0FC1AF363EB0B6581677A1C53B5098426A7
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..................1...........1.. ........@.. .......................@2...........@................................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x71e3fe
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x640DFAE7 [Sun Mar 12 16:16:39 2023 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x31e3a40x57.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3200000xa93.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x3220000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x31c4040x31c600unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x3200000xa930xc00False0.36328125data4.653972105845318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x3220000xc0x200False0.041015625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0x3200a00x31cdata0.4484924623115578
                            RT_MANIFEST0x3203bc0x6d7XML 1.0 document, Unicode text, UTF-8 (with BOM) text0.40319817247287265
                            DLLImport
                            mscoree.dll_CorExeMain

                            Download Network PCAP: filteredfull

                            TimestampSource PortDest PortSource IPDest IP
                            Jan 8, 2024 11:01:58.480252028 CET497294782192.168.2.491.92.251.28
                            Jan 8, 2024 11:01:59.491393089 CET497294782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:01.491344929 CET497294782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:05.491286993 CET497294782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:13.491972923 CET497294782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:22.898092985 CET497354782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:23.897809029 CET497354782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:25.897552013 CET497354782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:29.897697926 CET497354782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:37.913244009 CET497354782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:48.549446106 CET497364782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:49.553961992 CET497364782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:51.569431067 CET497364782192.168.2.491.92.251.28
                            Jan 8, 2024 11:02:55.569443941 CET497364782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:03.569474936 CET497364782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:13.257942915 CET497384782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:14.272861004 CET497384782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:16.288783073 CET497384782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:20.288333893 CET497384782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:28.288233995 CET497384782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:37.960603952 CET497394782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:38.991344929 CET497394782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:40.991468906 CET497394782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:44.991432905 CET497394782192.168.2.491.92.251.28
                            Jan 8, 2024 11:03:52.991400003 CET497394782192.168.2.491.92.251.28
                            050100s020406080100

                            Click to jump to process

                            050100s0.001020304050MB

                            Click to jump to process

                            • File
                            • Registry
                            • Network

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:11:01:54
                            Start date:08/01/2024
                            Path:C:\Users\user\Desktop\Client.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Desktop\Client.exe
                            Imagebase:0xd30000
                            File size:3'266'048 bytes
                            MD5 hash:0B665294EC2063215CDC72C07CAA5BCE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1647837014.0000000001050000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000002.2905668268.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1647508938.0000000000D32000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                            There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                            Execution Graph

                            Execution Coverage

                            Dynamic/Packed Code Coverage

                            Signature Coverage

                            Execution Coverage:10.2%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:3
                            Total number of Limit Nodes:0
                            Show Legend
                            Hide Nodes/Edges
                            execution_graph 12254 7ffd9bad3569 12255 7ffd9bad3571 DeleteFileW 12254->12255 12257 7ffd9bad3616 12255->12257

                            Executed Functions

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 7ffd9bd45be1-7ffd9bd45bfb 1 7ffd9bd45bff-7ffd9bd45c01 0->1 2 7ffd9bd45ce7-7ffd9bd45cf9 1->2 3 7ffd9bd45c07-7ffd9bd45c56 1->3 5 7ffd9bd45cff-7ffd9bd45d95 2->5 3->2 8 7ffd9bd45c5c-7ffd9bd45c97 3->8 15 7ffd9bd4601e-7ffd9bd4603b 5->15 13 7ffd9bd45cc4-7ffd9bd45cd5 8->13 14 7ffd9bd45c99-7ffd9bd45cc2 8->14 13->8 16 7ffd9bd45cd7 13->16 14->13 29 7ffd9bd45cd9-7ffd9bd45ce1 14->29 17 7ffd9bd46041-7ffd9bd46044 15->17 18 7ffd9bd45af5-7ffd9bd45b2f 15->18 16->2 20 7ffd9bd46066-7ffd9bd46087 17->20 21 7ffd9bd46046-7ffd9bd4604a 17->21 18->15 34 7ffd9bd45b35-7ffd9bd45b7f 18->34 27 7ffd9bd460a6-7ffd9bd460ab 20->27 28 7ffd9bd46089-7ffd9bd4609f 20->28 21->20 23 7ffd9bd4604c-7ffd9bd46061 call 7ffd9bd44ae0 21->23 23->20 31 7ffd9bd460ed-7ffd9bd460f4 27->31 32 7ffd9bd460ad-7ffd9bd460c8 27->32 28->27 29->2 35 7ffd9bd46122-7ffd9bd46127 31->35 36 7ffd9bd460f6-7ffd9bd46102 31->36 37 7ffd9bd460d2-7ffd9bd460d9 32->37 38 7ffd9bd460ca 32->38 34->15 52 7ffd9bd45b85-7ffd9bd45b88 34->52 40 7ffd9bd4612d-7ffd9bd46135 35->40 41 7ffd9bd461fc-7ffd9bd4620d 35->41 45 7ffd9bd46109-7ffd9bd4610f 36->45 43 7ffd9bd460e5-7ffd9bd460eb 37->43 44 7ffd9bd460da-7ffd9bd460e4 37->44 42 7ffd9bd460cd-7ffd9bd460d1 38->42 46 7ffd9bd46287-7ffd9bd462be 40->46 47 7ffd9bd4613b-7ffd9bd4614b 40->47 42->37 43->31 43->42 44->43 49 7ffd9bd46111-7ffd9bd46112 45->49 50 7ffd9bd4611a-7ffd9bd46120 45->50 54 7ffd9bd4614d-7ffd9bd46151 47->54 55 7ffd9bd4615b-7ffd9bd46163 47->55 49->50 50->35 50->36 56 7ffd9bd45bb5-7ffd9bd45bd3 52->56 57 7ffd9bd45b8a-7ffd9bd45baf 52->57 54->46 60 7ffd9bd46157-7ffd9bd46158 54->60 55->46 61 7ffd9bd46169-7ffd9bd46179 55->61 62 7ffd9bd45d9a-7ffd9bd45db3 56->62 63 7ffd9bd45bd9-7ffd9bd45bdb 56->63 57->15 57->56 60->55 70 7ffd9bd4617b-7ffd9bd4617f 61->70 71 7ffd9bd46189-7ffd9bd46191 61->71 68 7ffd9bd45e8f-7ffd9bd45ea8 62->68 69 7ffd9bd45db9-7ffd9bd45e00 62->69 63->0 63->15 68->15 75 7ffd9bd45eae-7ffd9bd45eb0 68->75 84 7ffd9bd45e02-7ffd9bd45e15 69->84 85 7ffd9bd45e1b-7ffd9bd45e8a 69->85 70->46 72 7ffd9bd46185-7ffd9bd46186 70->72 71->46 73 7ffd9bd46197-7ffd9bd461a7 71->73 72->71 80 7ffd9bd461b7-7ffd9bd461bf 73->80 81 7ffd9bd461a9-7ffd9bd461ad 73->81 75->15 77 7ffd9bd45eb6-7ffd9bd45ed3 75->77 77->15 87 7ffd9bd45ed9-7ffd9bd45edd 77->87 80->46 82 7ffd9bd461c5-7ffd9bd461d5 80->82 81->46 86 7ffd9bd461b3-7ffd9bd461b4 81->86 92 7ffd9bd461d7-7ffd9bd461db 82->92 93 7ffd9bd461e5-7ffd9bd461f5 82->93 84->15 84->85 85->15 86->80 87->15 89 7ffd9bd45ee3-7ffd9bd45f06 87->89 95 7ffd9bd45f0d-7ffd9bd46013 89->95 92->46 94 7ffd9bd461e1-7ffd9bd461e2 92->94 93->41 94->93 95->15
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID: u
                            • API String ID: 0-4067256894
                            • Opcode ID: 116fdfdca38026e45729fceeb02aaa2c3cf7e537cd64569f7648fcea0583c980
                            • Instruction ID: 9904589248795d0a4de589cce334fe2f45c9e07329e937e5ab72130b630f513e
                            • Opcode Fuzzy Hash: 116fdfdca38026e45729fceeb02aaa2c3cf7e537cd64569f7648fcea0583c980
                            • Instruction Fuzzy Hash: B3326F70A18A1D8FDBA8EF58C8957A973E2FF98304F1145B9D44ED32A5DF34A981CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 403 7ffd9bd493c1-7ffd9bd49409 405 7ffd9bd4941a-7ffd9bd4942c 403->405 406 7ffd9bd4940b-7ffd9bd49419 403->406 408 7ffd9bd49432-7ffd9bd49442 405->408 409 7ffd9bd494af-7ffd9bd494b3 405->409 417 7ffd9bd4972b-7ffd9bd49761 408->417 418 7ffd9bd49448-7ffd9bd49497 408->418 410 7ffd9bd494cb-7ffd9bd494cf 409->410 411 7ffd9bd494b5-7ffd9bd494b9 409->411 412 7ffd9bd494d1-7ffd9bd494f8 410->412 413 7ffd9bd494fe-7ffd9bd49502 410->413 419 7ffd9bd494c0-7ffd9bd494c4 411->419 412->413 424 7ffd9bd49781-7ffd9bd49799 412->424 415 7ffd9bd4971c-7ffd9bd4972a 413->415 416 7ffd9bd49508-7ffd9bd4950d 413->416 416->415 422 7ffd9bd49513-7ffd9bd4951d 416->422 452 7ffd9bd494a4-7ffd9bd494a8 418->452 453 7ffd9bd49499-7ffd9bd494a2 418->453 419->410 430 7ffd9bd4951f-7ffd9bd49531 422->430 431 7ffd9bd4956b-7ffd9bd49570 422->431 440 7ffd9bd4979b-7ffd9bd497a1 424->440 441 7ffd9bd497a5 424->441 430->431 442 7ffd9bd49533-7ffd9bd4955e 430->442 433 7ffd9bd49576-7ffd9bd49580 431->433 434 7ffd9bd496f8-7ffd9bd496fd 431->434 433->434 443 7ffd9bd49586-7ffd9bd49598 433->443 434->415 436 7ffd9bd496ff-7ffd9bd49714 434->436 436->415 449 7ffd9bd49716-7ffd9bd49719 436->449 444 7ffd9bd497a3 440->444 445 7ffd9bd497a9-7ffd9bd49808 440->445 441->445 446 7ffd9bd497a7-7ffd9bd497a8 441->446 442->431 459 7ffd9bd49560-7ffd9bd49564 442->459 457 7ffd9bd4968e-7ffd9bd496f1 443->457 458 7ffd9bd4959e-7ffd9bd495c5 443->458 444->441 464 7ffd9bd49dae-7ffd9bd49dc0 445->464 465 7ffd9bd4980e-7ffd9bd49820 445->465 446->445 449->415 452->409 453->409 457->434 459->431 465->464 470 7ffd9bd49826-7ffd9bd4985f 465->470 470->464 476 7ffd9bd49865-7ffd9bd498a6 470->476 480 7ffd9bd498ac-7ffd9bd498c4 476->480 481 7ffd9bd49958-7ffd9bd4996b 476->481 484 7ffd9bd498ca-7ffd9bd498ea 480->484 485 7ffd9bd4994c-7ffd9bd49952 480->485 486 7ffd9bd4996d-7ffd9bd4998e 481->486 487 7ffd9bd499c0 481->487 484->485 501 7ffd9bd498ec-7ffd9bd498fe 484->501 485->480 485->481 493 7ffd9bd49990-7ffd9bd499b7 486->493 494 7ffd9bd499b9-7ffd9bd499be 486->494 488 7ffd9bd499c2-7ffd9bd499c7 487->488 489 7ffd9bd49a0e-7ffd9bd49a31 488->489 490 7ffd9bd499c9-7ffd9bd499d0 488->490 498 7ffd9bd49b27-7ffd9bd49b33 489->498 499 7ffd9bd49a37-7ffd9bd49a5f 489->499 496 7ffd9bd499d7-7ffd9bd499f1 490->496 493->488 494->488 496->489 505 7ffd9bd499f3-7ffd9bd49a0c 496->505 498->464 502 7ffd9bd49b39-7ffd9bd49b4e 498->502 514 7ffd9bd49b1b-7ffd9bd49b21 499->514 515 7ffd9bd49a65-7ffd9bd49a80 499->515 501->485 508 7ffd9bd49900-7ffd9bd49904 501->508 507 7ffd9bd49d97-7ffd9bd49dad 502->507 505->489 512 7ffd9bd49dc1-7ffd9bd49dfa 508->512 513 7ffd9bd4990a-7ffd9bd4991f 508->513 512->507 519 7ffd9bd49dfc-7ffd9bd49e63 512->519 520 7ffd9bd49926-7ffd9bd49928 513->520 514->498 514->499 515->514 525 7ffd9bd49a86-7ffd9bd49a98 515->525 528 7ffd9bd49e69-7ffd9bd49e6b 519->528 529 7ffd9bd49f75-7ffd9bd49fa8 519->529 520->485 522 7ffd9bd4992a-7ffd9bd49948 call 7ffd9bd44bb0 520->522 522->485 525->514 538 7ffd9bd49a9e-7ffd9bd49aa2 525->538 532 7ffd9bd49e6d-7ffd9bd49e7f 528->532 533 7ffd9bd49e85-7ffd9bd49e93 528->533 542 7ffd9bd49faf-7ffd9bd49fba 529->542 532->533 532->542 534 7ffd9bd49e99-7ffd9bd49eb0 533->534 535 7ffd9bd49fe8-7ffd9bd4a012 533->535 553 7ffd9bd49eb2-7ffd9bd49ec4 534->553 554 7ffd9bd49eca-7ffd9bd49ecd 534->554 549 7ffd9bd4a017-7ffd9bd4a01b 535->549 538->512 540 7ffd9bd49aa8-7ffd9bd49aeb 538->540 540->514 570 7ffd9bd49aed-7ffd9bd49b18 call 7ffd9bd44bb0 540->570 551 7ffd9bd49f41-7ffd9bd49f42 542->551 552 7ffd9bd49fbc-7ffd9bd49fd1 542->552 557 7ffd9bd4a022-7ffd9bd4a061 549->557 560 7ffd9bd49fd3 552->560 561 7ffd9bd49fd6-7ffd9bd49fe1 552->561 553->554 553->557 558 7ffd9bd49ecf-7ffd9bd49ee6 554->558 559 7ffd9bd49ef6-7ffd9bd49f12 call 7ffd9bd47240 554->559 583 7ffd9bd4a063-7ffd9bd4a069 557->583 584 7ffd9bd4a06d 557->584 558->559 577 7ffd9bd49ee8-7ffd9bd49eec 558->577 574 7ffd9bd49f43-7ffd9bd49f47 559->574 575 7ffd9bd49f14-7ffd9bd49f40 559->575 560->561 561->535 570->514 585 7ffd9bd49f4e-7ffd9bd49f74 574->585 575->551 580 7ffd9bd49ef3-7ffd9bd49ef4 577->580 580->559 586 7ffd9bd4a071-7ffd9bd4a07a 583->586 587 7ffd9bd4a06b 583->587 584->586 588 7ffd9bd4a06f 584->588 586->549 589 7ffd9bd4a07c-7ffd9bd4a0ac 586->589 587->584 588->586 593 7ffd9bd4a0ae-7ffd9bd4a0d5 589->593 594 7ffd9bd4a0ef-7ffd9bd4a122 589->594 600 7ffd9bd4a129-7ffd9bd4a171 593->600 603 7ffd9bd4a0d7-7ffd9bd4a0ee 593->603 594->600 608 7ffd9bd4a173 600->608 609 7ffd9bd4a175-7ffd9bd4a197 600->609 608->609 610 7ffd9bd4a1b5-7ffd9bd4a1ba 608->610 612 7ffd9bd4a19d-7ffd9bd4a1af 609->612 613 7ffd9bd4a27a-7ffd9bd4a28c 609->613 617 7ffd9bd4a1b1-7ffd9bd4a1b4 612->617 618 7ffd9bd4a1bb-7ffd9bd4a1d3 call 7ffd9bd438a0 612->618 615 7ffd9bd4a291-7ffd9bd4a2c3 613->615 627 7ffd9bd4a305 615->627 628 7ffd9bd4a2c5-7ffd9bd4a2e2 615->628 617->610 623 7ffd9bd4a1d5-7ffd9bd4a206 618->623 624 7ffd9bd4a237-7ffd9bd4a240 618->624 639 7ffd9bd4a231-7ffd9bd4a235 623->639 640 7ffd9bd4a208-7ffd9bd4a22f 623->640 629 7ffd9bd4a2f5-7ffd9bd4a2ff 627->629 630 7ffd9bd4a307 627->630 633 7ffd9bd4a309-7ffd9bd4a30b 628->633 635 7ffd9bd4a2e4-7ffd9bd4a2f4 628->635 632 7ffd9bd4a301-7ffd9bd4a302 629->632 629->633 630->633 632->627 636 7ffd9bd4a30d-7ffd9bd4a31b 633->636 637 7ffd9bd4a31c-7ffd9bd4a32c 633->637 635->629 639->623 639->624 640->639 642 7ffd9bd4a241-7ffd9bd4a266 640->642 642->615 645 7ffd9bd4a268-7ffd9bd4a279 642->645
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 534bb7ac4840c8499a05f9c186bcb0a435712692894623745fefbcaa672ad795
                            • Instruction ID: bad8dfad7b709a077f31937892bcdc30a85b4c37e3f74f98b5e50388b9483c59
                            • Opcode Fuzzy Hash: 534bb7ac4840c8499a05f9c186bcb0a435712692894623745fefbcaa672ad795
                            • Instruction Fuzzy Hash: EC92193171D90D4FEBA8EB6D9469A7533D2FF99310F0501BAE44EC72E6DE28AC428741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 678 7ffd9bd44dc6-7ffd9bd44dd8 680 7ffd9bd44dbe-7ffd9bd44dc3 678->680 681 7ffd9bd44dda 678->681 682 7ffd9bd44d77-7ffd9bd44d7a 681->682 683 7ffd9bd44ddc-7ffd9bd44e33 681->683 684 7ffd9bd44d7c-7ffd9bd44da2 682->684 685 7ffd9bd44da9-7ffd9bd44dbc 682->685 690 7ffd9bd44e84-7ffd9bd44ebc call 7ffd9bd438a0 call 7ffd9bd43730 683->690 691 7ffd9bd44e35-7ffd9bd44e40 683->691 684->685 685->680 701 7ffd9bd44ebe-7ffd9bd44ed3 call 7ffd9bd44ae0 690->701 702 7ffd9bd44ed8-7ffd9bd44ee0 690->702 694 7ffd9bd44e47-7ffd9bd44e4a 691->694 694->690 696 7ffd9bd44e4c-7ffd9bd44e61 call 7ffd9bd43730 694->696 696->690 705 7ffd9bd44e63-7ffd9bd44e7f call 7ffd9bd43140 696->705 701->702 703 7ffd9bd44ee2-7ffd9bd44efa 702->703 704 7ffd9bd44efc 702->704 707 7ffd9bd44efe-7ffd9bd44f05 703->707 704->707 705->690 710 7ffd9bd44f18-7ffd9bd44f5a 707->710 711 7ffd9bd44f07-7ffd9bd44f17 707->711 712 7ffd9bd44f60-7ffd9bd44f93 710->712 713 7ffd9bd45a36-7ffd9bd45a40 710->713 724 7ffd9bd451ee-7ffd9bd45200 712->724 725 7ffd9bd44f99-7ffd9bd44fab 712->725 714 7ffd9bd45a42-7ffd9bd45a4d 713->714 715 7ffd9bd45a58 713->715 716 7ffd9bd45a5d-7ffd9bd45a5f 714->716 715->716 718 7ffd9bd45a61-7ffd9bd45a73 716->718 719 7ffd9bd45a7a-7ffd9bd45a7f 716->719 718->719 721 7ffd9bd45a84-7ffd9bd45a95 719->721 722 7ffd9bd45a81 719->722 727 7ffd9bd4620e-7ffd9bd462be 721->727 722->721 731 7ffd9bd452c3-7ffd9bd452c5 724->731 732 7ffd9bd45206-7ffd9bd45232 724->732 725->724 733 7ffd9bd44fb1-7ffd9bd44fe3 725->733 735 7ffd9bd452c7-7ffd9bd452d9 731->735 736 7ffd9bd45335-7ffd9bd45347 731->736 732->731 743 7ffd9bd45238-7ffd9bd4523d 732->743 739 7ffd9bd45016-7ffd9bd4504a 733->739 740 7ffd9bd44fe5-7ffd9bd45007 733->740 735->736 745 7ffd9bd452db-7ffd9bd452de 735->745 747 7ffd9bd4534d-7ffd9bd45379 736->747 748 7ffd9bd4591b-7ffd9bd4592d 736->748 762 7ffd9bd4507e-7ffd9bd450b5 739->762 763 7ffd9bd4504c-7ffd9bd4506c 739->763 740->739 743->731 749 7ffd9bd45243-7ffd9bd45246 743->749 752 7ffd9bd452e0-7ffd9bd452fb 745->752 753 7ffd9bd45304-7ffd9bd45332 call 7ffd9bd44bb0 745->753 773 7ffd9bd453af-7ffd9bd453c6 747->773 774 7ffd9bd4537b-7ffd9bd45384 747->774 771 7ffd9bd4592f-7ffd9bd45937 748->771 772 7ffd9bd4599c-7ffd9bd459ae 748->772 750 7ffd9bd45248-7ffd9bd45251 749->750 751 7ffd9bd4526b-7ffd9bd45274 749->751 750->751 759 7ffd9bd45276-7ffd9bd45299 751->759 760 7ffd9bd4529b-7ffd9bd452c0 call 7ffd9bd44bb0 751->760 752->753 753->736 759->760 760->731 781 7ffd9bd45141-7ffd9bd4516e 762->781 782 7ffd9bd450bb-7ffd9bd450d3 762->782 763->762 771->772 779 7ffd9bd45939-7ffd9bd45966 771->779 793 7ffd9bd459b0-7ffd9bd459ba 772->793 794 7ffd9bd45a25-7ffd9bd45a30 772->794 791 7ffd9bd454c2-7ffd9bd454ef 773->791 792 7ffd9bd453cc-7ffd9bd453f5 773->792 775 7ffd9bd453a8-7ffd9bd453a9 774->775 776 7ffd9bd45386-7ffd9bd45396 774->776 775->773 776->775 779->772 798 7ffd9bd45968-7ffd9bd45971 779->798 808 7ffd9bd45170-7ffd9bd45179 781->808 809 7ffd9bd451a4-7ffd9bd451ae 781->809 789 7ffd9bd45138-7ffd9bd4513f 782->789 790 7ffd9bd450d5-7ffd9bd450e5 782->790 802 7ffd9bd45105-7ffd9bd45136 789->802 790->802 811 7ffd9bd4551f-7ffd9bd45548 791->811 812 7ffd9bd454f1-7ffd9bd4551c 791->812 792->748 816 7ffd9bd453fb-7ffd9bd4541b 792->816 800 7ffd9bd459c0-7ffd9bd459ec 793->800 801 7ffd9bd45a4f-7ffd9bd45a56 793->801 794->712 794->713 804 7ffd9bd45973-7ffd9bd45983 798->804 805 7ffd9bd45995-7ffd9bd45996 798->805 800->794 823 7ffd9bd459ee-7ffd9bd459f7 800->823 801->794 802->809 804->805 805->772 819 7ffd9bd4519d-7ffd9bd4519e 808->819 820 7ffd9bd4517b-7ffd9bd4518b 808->820 809->727 814 7ffd9bd451b4-7ffd9bd451d5 809->814 832 7ffd9bd455df-7ffd9bd455f3 811->832 833 7ffd9bd4554e-7ffd9bd4557d 811->833 812->811 814->724 834 7ffd9bd451d7-7ffd9bd451e6 814->834 816->791 819->809 820->819 830 7ffd9bd45a1e-7ffd9bd45a1f 823->830 831 7ffd9bd459f9-7ffd9bd45a09 823->831 830->794 831->830 836 7ffd9bd455f5-7ffd9bd4560c 832->836 833->832 840 7ffd9bd4557f-7ffd9bd455ab 833->840 834->724 841 7ffd9bd4560e-7ffd9bd45613 836->841 842 7ffd9bd45647-7ffd9bd45674 836->842 840->832 847 7ffd9bd455ad-7ffd9bd455dc 840->847 841->842 843 7ffd9bd45615-7ffd9bd45637 841->843 849 7ffd9bd45676-7ffd9bd456c7 call 7ffd9bd44ae0 842->849 850 7ffd9bd456cc-7ffd9bd456f8 842->850 843->836 852 7ffd9bd45639-7ffd9bd45644 843->852 847->832 849->850 857 7ffd9bd4573d-7ffd9bd45769 850->857 858 7ffd9bd456fa-7ffd9bd45738 call 7ffd9bd44ae0 850->858 852->842 864 7ffd9bd457ae-7ffd9bd457da 857->864 865 7ffd9bd4576b-7ffd9bd457a9 call 7ffd9bd44ae0 857->865 858->857 869 7ffd9bd45842-7ffd9bd4586f 864->869 870 7ffd9bd457dc-7ffd9bd457f0 864->870 865->864 876 7ffd9bd458b4-7ffd9bd458e0 869->876 877 7ffd9bd45871-7ffd9bd458af call 7ffd9bd44ae0 869->877 873 7ffd9bd457f1-7ffd9bd45811 870->873 873->869 878 7ffd9bd45813-7ffd9bd45835 873->878 876->748 883 7ffd9bd458e2-7ffd9bd458eb 876->883 877->876 878->873 888 7ffd9bd45837-7ffd9bd4583a 878->888 886 7ffd9bd458ed-7ffd9bd45910 883->886 887 7ffd9bd45912-7ffd9bd45913 883->887 886->887 887->748 888->869
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f6be248f8970c26236d6f7a55f901e6d58963303c146e6da9c11ebcf68025dd6
                            • Instruction ID: 360fd5ef5c4295ae5c4abbcd51e33acfea9504b768569c70dabb4520cf79404f
                            • Opcode Fuzzy Hash: f6be248f8970c26236d6f7a55f901e6d58963303c146e6da9c11ebcf68025dd6
                            • Instruction Fuzzy Hash: 87A28E70A19A0D8FDFA8EF58C490BA977E2FF98304F5141A9D44ED72D6CA35E981CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 891 7ffd9bd4a7cd-7ffd9bd4a869 893 7ffd9bd4aee1-7ffd9bd4aef6 891->893 894 7ffd9bd4a86f-7ffd9bd4a872 891->894 894->893 895 7ffd9bd4a878-7ffd9bd4a895 894->895 895->893 897 7ffd9bd4a89b-7ffd9bd4a8ba 895->897 899 7ffd9bd4a8bc-7ffd9bd4a8bf 897->899 900 7ffd9bd4a8c6-7ffd9bd4a8d9 897->900 901 7ffd9bd4a8c1 899->901 902 7ffd9bd4a8de-7ffd9bd4a8f2 899->902 903 7ffd9bd4a969-7ffd9bd4a97b 900->903 901->893 906 7ffd9bd4a923-7ffd9bd4a962 902->906 907 7ffd9bd4a8f4-7ffd9bd4a90e 902->907 903->893 908 7ffd9bd4a981-7ffd9bd4a9c0 903->908 906->903 907->893 913 7ffd9bd4a914-7ffd9bd4a922 907->913 908->893 916 7ffd9bd4a9c6-7ffd9bd4a9d0 908->916 913->906 919 7ffd9bd4a9d2-7ffd9bd4a9e6 916->919 920 7ffd9bd4a9e8-7ffd9bd4a9f8 916->920 922 7ffd9bd4aa02-7ffd9bd4aa57 919->922 920->922 926 7ffd9bd4aa5d-7ffd9bd4aa65 922->926 927 7ffd9bd4aacb-7ffd9bd4aad3 926->927 928 7ffd9bd4aa67-7ffd9bd4aa7b 926->928 927->893 929 7ffd9bd4aad9-7ffd9bd4aafb 927->929 928->927 931 7ffd9bd4aa7d-7ffd9bd4aac7 928->931 933 7ffd9bd4ab01-7ffd9bd4ab2a 929->933 934 7ffd9bd4abff-7ffd9bd4ac35 929->934 931->927 938 7ffd9bd4abb1-7ffd9bd4abd2 933->938 939 7ffd9bd4ab30-7ffd9bd4ab56 933->939 934->893 946 7ffd9bd4ac3b-7ffd9bd4ac4d 934->946 938->933 942 7ffd9bd4abd8 938->942 939->938 949 7ffd9bd4ab58-7ffd9bd4ab6e 939->949 942->934 946->893 951 7ffd9bd4ac53-7ffd9bd4ac71 946->951 949->938 954 7ffd9bd4ab70-7ffd9bd4ab88 949->954 951->893 957 7ffd9bd4ac77-7ffd9bd4aca5 951->957 954->938 958 7ffd9bd4ab8a-7ffd9bd4abaf 954->958 965 7ffd9bd4aca7-7ffd9bd4acc1 957->965 966 7ffd9bd4acc8-7ffd9bd4acd5 957->966 958->938 961 7ffd9bd4abda-7ffd9bd4abf8 958->961 961->934 965->966 969 7ffd9bd4ad9a-7ffd9bd4adba 966->969 970 7ffd9bd4acdb-7ffd9bd4ad08 966->970 973 7ffd9bd4adc4-7ffd9bd4ae00 969->973 974 7ffd9bd4adbc-7ffd9bd4adbd 969->974 979 7ffd9bd4ad0a-7ffd9bd4ad24 970->979 980 7ffd9bd4ad2b-7ffd9bd4ad37 970->980 973->893 986 7ffd9bd4ae06-7ffd9bd4ae23 973->986 974->973 979->980 984 7ffd9bd4ad39-7ffd9bd4ad45 980->984 985 7ffd9bd4ad88-7ffd9bd4ad94 980->985 987 7ffd9bd4b030-7ffd9bd4b047 984->987 988 7ffd9bd4ad4b-7ffd9bd4ad81 984->988 985->893 985->969 993 7ffd9bd4ae2d-7ffd9bd4ae68 986->993 994 7ffd9bd4ae25-7ffd9bd4ae26 986->994 995 7ffd9bd4b051-7ffd9bd4b0bf call 7ffd9bd44860 call 7ffd9bd47560 call 7ffd9bd44b60 call 7ffd9bd4b0c0 987->995 996 7ffd9bd4b049-7ffd9bd4b050 987->996 988->985 993->893 1007 7ffd9bd4ae6a-7ffd9bd4ae7c 993->1007 994->993 996->995 1007->893 1013 7ffd9bd4ae7e-7ffd9bd4ae9c 1007->1013 1013->893 1016 7ffd9bd4ae9e-7ffd9bd4aeba 1013->1016 1019 7ffd9bd4aebc-7ffd9bd4aedf 1016->1019 1020 7ffd9bd4aef7-7ffd9bd4af6c 1016->1020 1019->893 1019->1020 1030 7ffd9bd4af72-7ffd9bd4af9a 1020->1030 1031 7ffd9bd4b017-7ffd9bd4b02f 1020->1031 1030->1031 1034 7ffd9bd4af9c-7ffd9bd4b010 1030->1034 1034->1031
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 09fccac0b19cfcb7b639db89e0b89b02bf49a7ce1993679a619d9a7e130f84f3
                            • Instruction ID: 5215e83197aa38b1d32aef9d0d0090d9e6e952a459d6184cd28d65997fe92092
                            • Opcode Fuzzy Hash: 09fccac0b19cfcb7b639db89e0b89b02bf49a7ce1993679a619d9a7e130f84f3
                            • Instruction Fuzzy Hash: 22625130709A098FEB98EB2CC4A5B6977E2FF99304F1545B9E44DC72A6DE34EC418B41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1041 7ffd9bd48a61-7ffd9bd48a85 1043 7ffd9bd48acf-7ffd9bd48ad2 1041->1043 1044 7ffd9bd48a87-7ffd9bd48aac 1041->1044 1045 7ffd9bd48aae-7ffd9bd48abe 1044->1045 1046 7ffd9bd48ac0-7ffd9bd48ace 1044->1046 1045->1046 1048 7ffd9bd48ad3-7ffd9bd48b04 1045->1048 1046->1043 1051 7ffd9bd48b53-7ffd9bd48b78 call 7ffd9bd475f0 1048->1051 1052 7ffd9bd48b06-7ffd9bd48b25 call 7ffd9bd43140 1048->1052 1057 7ffd9bd48de2-7ffd9bd48df5 call 7ffd9bd48570 1051->1057 1058 7ffd9bd48b7e-7ffd9bd48b8c call 7ffd9bd44640 1051->1058 1052->1051 1059 7ffd9bd48b27-7ffd9bd48b47 call 7ffd9bd43020 1052->1059 1066 7ffd9bd48e22-7ffd9bd48e24 1057->1066 1067 7ffd9bd48df7-7ffd9bd48e18 1057->1067 1068 7ffd9bd48b8e-7ffd9bd48ba2 1058->1068 1069 7ffd9bd48ba6-7ffd9bd48ba9 1058->1069 1059->1051 1070 7ffd9bd48b49-7ffd9bd48b50 1059->1070 1073 7ffd9bd48e33-7ffd9bd48e46 1066->1073 1074 7ffd9bd48e26-7ffd9bd48e2a 1066->1074 1067->1066 1082 7ffd9bd48e1a-7ffd9bd48e1f 1067->1082 1068->1069 1071 7ffd9bd48d73-7ffd9bd48db3 1069->1071 1072 7ffd9bd48baf-7ffd9bd48bb2 1069->1072 1070->1051 1071->1057 1077 7ffd9bd48db5-7ffd9bd48dd6 1072->1077 1078 7ffd9bd48bb8 1072->1078 1075 7ffd9bd48e47-7ffd9bd48e55 1073->1075 1074->1073 1079 7ffd9bd48e2c-7ffd9bd48e2e 1074->1079 1081 7ffd9bd48e56-7ffd9bd48eb6 1075->1081 1077->1075 1085 7ffd9bd48dd8-7ffd9bd48dda 1077->1085 1078->1057 1083 7ffd9bd48ec5-7ffd9bd48ec8 1079->1083 1093 7ffd9bd48ebe-7ffd9bd48ebf 1081->1093 1082->1066 1087 7ffd9bd48ece-7ffd9bd48f41 call 7ffd9bd47850 1083->1087 1088 7ffd9bd492b7-7ffd9bd492ca 1083->1088 1085->1081 1090 7ffd9bd48ddc 1085->1090 1101 7ffd9bd48f43-7ffd9bd48f64 1087->1101 1102 7ffd9bd48f66 1087->1102 1091 7ffd9bd48dde 1090->1091 1092 7ffd9bd48ddf 1090->1092 1091->1092 1092->1057 1093->1083 1101->1102 1103 7ffd9bd48f68-7ffd9bd48f7b 1101->1103 1102->1103 1106 7ffd9bd48f7d-7ffd9bd48fa6 1103->1106 1107 7ffd9bd48fab-7ffd9bd48fe4 1103->1107 1112 7ffd9bd49060-7ffd9bd49067 1106->1112 1113 7ffd9bd48fee-7ffd9bd4901a 1107->1113 1114 7ffd9bd48fe6-7ffd9bd48fe7 1107->1114 1115 7ffd9bd49083-7ffd9bd490e4 1112->1115 1116 7ffd9bd49069-7ffd9bd49075 1112->1116 1113->1112 1121 7ffd9bd4901c-7ffd9bd49050 1113->1121 1114->1113 1125 7ffd9bd49105-7ffd9bd49127 1115->1125 1126 7ffd9bd490e6-7ffd9bd490fb 1115->1126 1116->1115 1118 7ffd9bd49077-7ffd9bd4907c 1116->1118 1118->1115 1121->1112 1132 7ffd9bd49052-7ffd9bd49059 1121->1132 1130 7ffd9bd49143-7ffd9bd49144 1125->1130 1131 7ffd9bd49129-7ffd9bd49135 1125->1131 1126->1125 1133 7ffd9bd49146-7ffd9bd49161 1130->1133 1134 7ffd9bd4913d-7ffd9bd49141 1131->1134 1132->1112 1133->1088 1136 7ffd9bd49167-7ffd9bd4917d call 7ffd9bd48570 1133->1136 1134->1133 1136->1088 1139 7ffd9bd49183-7ffd9bd491a4 1136->1139 1141 7ffd9bd491f1-7ffd9bd49212 1139->1141 1142 7ffd9bd491a6-7ffd9bd491d4 1139->1142 1146 7ffd9bd49254-7ffd9bd49275 1141->1146 1147 7ffd9bd49214-7ffd9bd49246 1141->1147 1142->1141 1148 7ffd9bd491d6-7ffd9bd491ec 1142->1148 1146->1088 1154 7ffd9bd49277-7ffd9bd492a9 1146->1154 1147->1146 1155 7ffd9bd49248-7ffd9bd49251 1147->1155 1148->1088 1154->1088 1159 7ffd9bd492ab-7ffd9bd492b4 1154->1159 1155->1146 1159->1088
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d35d516f0520a4b35b9a32d9008b12ee959e317f5752c497bb2397b7e3b98099
                            • Instruction ID: 5f3342e71da4dcf2ff0dc86910d823ada88b04a1a1883bc47214fcc7d66e618a
                            • Opcode Fuzzy Hash: d35d516f0520a4b35b9a32d9008b12ee959e317f5752c497bb2397b7e3b98099
                            • Instruction Fuzzy Hash: 0222AF30B09A0D4FEBA8EB5984A57B873E2FF98340F55417DD44EC32E2DE39A9428741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 102 7ffd9bd43f3d-7ffd9bd43f3e 103 7ffd9bd43f40-7ffd9bd43f47 102->103 104 7ffd9bd43f9f-7ffd9bd43fa6 102->104 103->104 105 7ffd9bd43fa8-7ffd9bd43fa9 104->105 106 7ffd9bd43fab-7ffd9bd43fbd 104->106 105->106 108 7ffd9bd43fbf-7ffd9bd43fc7 106->108 109 7ffd9bd4400d-7ffd9bd4400e 106->109 110 7ffd9bd44002-7ffd9bd44008 108->110 111 7ffd9bd43fc9-7ffd9bd43fcc 108->111 113 7ffd9bd44015-7ffd9bd4401d 109->113 112 7ffd9bd44513-7ffd9bd44525 110->112 111->110 114 7ffd9bd43fce-7ffd9bd43ffd 111->114 117 7ffd9bd44526-7ffd9bd44539 112->117 115 7ffd9bd4401f-7ffd9bd44034 113->115 116 7ffd9bd44038-7ffd9bd4403e 113->116 114->117 115->116 119 7ffd9bd44044-7ffd9bd44058 116->119 120 7ffd9bd44379-7ffd9bd44380 116->120 119->120 122 7ffd9bd44382-7ffd9bd44385 120->122 123 7ffd9bd44387-7ffd9bd44393 120->123 124 7ffd9bd44395-7ffd9bd44398 122->124 123->124 127 7ffd9bd443a5-7ffd9bd443ad 124->127 128 7ffd9bd4439a-7ffd9bd443a0 124->128 129 7ffd9bd4450d 127->129 130 7ffd9bd443b3-7ffd9bd443d0 127->130 128->117 129->112 132 7ffd9bd443d2-7ffd9bd443e2 call 7ffd9bd43020 130->132 133 7ffd9bd443f7-7ffd9bd44402 130->133 132->133 145 7ffd9bd443e4-7ffd9bd443f2 132->145 135 7ffd9bd444c2-7ffd9bd444c5 133->135 136 7ffd9bd44408-7ffd9bd4440d 133->136 135->129 137 7ffd9bd444c7-7ffd9bd444cd 135->137 139 7ffd9bd4440f 136->139 140 7ffd9bd44414-7ffd9bd44417 136->140 143 7ffd9bd444cf-7ffd9bd444d4 137->143 144 7ffd9bd444d6 137->144 139->140 141 7ffd9bd44427-7ffd9bd4442a 140->141 142 7ffd9bd44419-7ffd9bd44423 140->142 146 7ffd9bd4442c-7ffd9bd4442f 141->146 147 7ffd9bd4447a-7ffd9bd4447d 141->147 142->141 148 7ffd9bd444db-7ffd9bd4450b 143->148 144->148 145->133 149 7ffd9bd44451-7ffd9bd44454 146->149 150 7ffd9bd44431-7ffd9bd4444b 146->150 152 7ffd9bd4447f-7ffd9bd44488 147->152 153 7ffd9bd4448a-7ffd9bd4448f 147->153 148->117 154 7ffd9bd44464-7ffd9bd4446a 149->154 155 7ffd9bd44456-7ffd9bd4445c 149->155 150->149 162 7ffd9bd4453a-7ffd9bd44561 150->162 157 7ffd9bd44493-7ffd9bd444c0 152->157 153->157 154->147 160 7ffd9bd4446c-7ffd9bd44476 154->160 155->154 159 7ffd9bd4445e-7ffd9bd44461 155->159 157->117 159->154 160->147 167 7ffd9bd44563-7ffd9bd44576 162->167 168 7ffd9bd44578-7ffd9bd4459c 162->168 171 7ffd9bd4459e-7ffd9bd44614 167->171 168->171 176 7ffd9bd44616-7ffd9bd44618 171->176 177 7ffd9bd44619-7ffd9bd44653 171->177 176->177 180 7ffd9bd44664-7ffd9bd44676 177->180 181 7ffd9bd44655-7ffd9bd4465d 177->181 185 7ffd9bd44683-7ffd9bd4468c 180->185 186 7ffd9bd44678-7ffd9bd44682 180->186 181->180 182 7ffd9bd4465f 181->182 184 7ffd9bd446fc-7ffd9bd44701 182->184 185->184
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: 7c3e6d41121c81899a4bc8c255ddbbd598a10cdf9f548715867ebc9df2131f7f
                            • Instruction ID: f29f604141e05e8f45d2e6c9480bd27db78a93c9e665c57a4824131faa25600e
                            • Opcode Fuzzy Hash: 7c3e6d41121c81899a4bc8c255ddbbd598a10cdf9f548715867ebc9df2131f7f
                            • Instruction Fuzzy Hash: 58D11B31B0E74E4FE7A99B6894653783BD2EF85310F0512BED48EC71E2DE58AD828741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 188 7ffd9bad3525-7ffd9bad352f 189 7ffd9bad3571-7ffd9bad35d8 188->189 190 7ffd9bad3531-7ffd9bad3562 188->190 195 7ffd9bad35da-7ffd9bad35df 189->195 196 7ffd9bad35e2-7ffd9bad3614 DeleteFileW 189->196 190->189 195->196 197 7ffd9bad361c-7ffd9bad364a 196->197 198 7ffd9bad3616 196->198 198->197
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2909327055.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bad0000_Client.jbxd
                            Similarity
                            • API ID: DeleteFile
                            • String ID:
                            • API String ID: 4033686569-0
                            • Opcode ID: 2135ae8f4ce132ad27761e2ed12d3176e85bc37aaf7025f8b2f26942bf098e95
                            • Instruction ID: 27e327f135002f56c8891c192d94a2bcf692328840ee77c2fb44064f403c299e
                            • Opcode Fuzzy Hash: 2135ae8f4ce132ad27761e2ed12d3176e85bc37aaf7025f8b2f26942bf098e95
                            • Instruction Fuzzy Hash: 0741273190DB8C8FDB19DBA888596F97FF0EF66310F0542AFD049C71A2DA646805C781
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 200 7ffd9bad3569-7ffd9bad35d8 205 7ffd9bad35da-7ffd9bad35df 200->205 206 7ffd9bad35e2-7ffd9bad3614 DeleteFileW 200->206 205->206 207 7ffd9bad361c-7ffd9bad364a 206->207 208 7ffd9bad3616 206->208 208->207
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2909327055.00007FFD9BAD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bad0000_Client.jbxd
                            Similarity
                            • API ID: DeleteFile
                            • String ID:
                            • API String ID: 4033686569-0
                            • Opcode ID: 0e6403526c0e0dcafb119d11ab9d7e30699f28b427d7bd7a2ff633214a2ffe10
                            • Instruction ID: c0bdd0801691b3c77f0f858c15730e45abafacfaa5b1a1bd4014b3011c5eb606
                            • Opcode Fuzzy Hash: 0e6403526c0e0dcafb119d11ab9d7e30699f28b427d7bd7a2ff633214a2ffe10
                            • Instruction Fuzzy Hash: 5D31D03190CB5C8FDB19DB988859AF9BBF0FF66320F04426BD049D3292DB74A805CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID: $_L
                            • API String ID: 0-1448256362
                            • Opcode ID: 44f1475e0c55e76cf0fe27a205367238e1d47f1e4736dd2b873068bc03339ba7
                            • Instruction ID: 114d278830d07803656289bfb75093df5287aa64f547fbcf68e74e51e2639546
                            • Opcode Fuzzy Hash: 44f1475e0c55e76cf0fe27a205367238e1d47f1e4736dd2b873068bc03339ba7
                            • Instruction Fuzzy Hash: 18911731B0EA4E4FDBA9DB6C84645B577E2EF55320B0505BED04EC32E2CE28E9058741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID: a$_H
                            • API String ID: 0-3636341119
                            • Opcode ID: c3beb7ee3d0bc865dcca370f57d896c915e40bfb86fdb62b5f358f473db9731e
                            • Instruction ID: 64f48288544ddb3333098d569b3bcee17b9a1917e6b201526a8e0ec165a99c5c
                            • Opcode Fuzzy Hash: c3beb7ee3d0bc865dcca370f57d896c915e40bfb86fdb62b5f358f473db9731e
                            • Instruction Fuzzy Hash: 4B513A72B1AE4E0FE7E8D66844656B573C2FF98354B54057ED05EC72E7ED28B9028700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 646 7ffd9bd4d6d4-7ffd9bd4d6da 647 7ffd9bd4d6dc-7ffd9bd4d792 646->647 648 7ffd9bd4d677-7ffd9bd4d67d 646->648 663 7ffd9bd4d79a-7ffd9bd4d7a7 647->663 649 7ffd9bd4d67f 648->649 650 7ffd9bd4d680-7ffd9bd4d6b3 648->650 649->650 654 7ffd9bd4d6b5 650->654 655 7ffd9bd4d6b6-7ffd9bd4d6ca 650->655
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID: N$_H
                            • API String ID: 0-552572439
                            • Opcode ID: bbddc484bd758c375f633dc7225c45ece0ec354ce4e52a596beb1dc44d2fd9bb
                            • Instruction ID: c0f9d9b9a93e9717bc4e3e3b8d42df8c19f6f2dca59f925a03ac2781cfcf2004
                            • Opcode Fuzzy Hash: bbddc484bd758c375f633dc7225c45ece0ec354ce4e52a596beb1dc44d2fd9bb
                            • Instruction Fuzzy Hash: CF316C71B0D7890FE3298B2C582A1617BD2EF86314B1941BFE48EC72D7DD29AC028341
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1161 7ffd9bd42c10-7ffd9bd42c1a 1162 7ffd9bd42bb7-7ffd9bd42bbf 1161->1162 1163 7ffd9bd42c1c-7ffd9bd42c2c 1161->1163 1165 7ffd9bd42bc1-7ffd9bd42bea 1162->1165 1166 7ffd9bd42c2e-7ffd9bd42c32 1163->1166 1167 7ffd9bd42c34-7ffd9bd42c48 1163->1167 1174 7ffd9bd42b87-7ffd9bd42b8a 1165->1174 1175 7ffd9bd42bec-7ffd9bd42bfc 1165->1175 1166->1167 1168 7ffd9bd42c4b-7ffd9bd42caa 1166->1168 1167->1168 1188 7ffd9bd42cf4-7ffd9bd42d5e 1168->1188 1189 7ffd9bd42cac-7ffd9bd42cf3 1168->1189 1176 7ffd9bd42b27-7ffd9bd42b60 1174->1176 1177 7ffd9bd42b8c 1174->1177 1180 7ffd9bd42b8d-7ffd9bd42b99 1176->1180 1196 7ffd9bd42b62-7ffd9bd42b86 1176->1196 1177->1180 1185 7ffd9bd42ba1-7ffd9bd42bbf 1180->1185 1186 7ffd9bd42b9b-7ffd9bd42ba0 1180->1186 1185->1165 1206 7ffd9bd42d60-7ffd9bd42d62 1188->1206 1207 7ffd9bd42dcf-7ffd9bd42ddc 1188->1207 1189->1188 1196->1174 1208 7ffd9bd42dde-7ffd9bd42de0 1206->1208 1209 7ffd9bd42d64 1206->1209 1207->1208 1210 7ffd9bd42e4d-7ffd9bd42e56 1207->1210 1211 7ffd9bd42de2 1208->1211 1212 7ffd9bd42e5c-7ffd9bd42e64 1208->1212 1213 7ffd9bd42d66-7ffd9bd42d6e 1209->1213 1214 7ffd9bd42dab 1209->1214 1221 7ffd9bd42e58-7ffd9bd42e59 1210->1221 1217 7ffd9bd42de4 1211->1217 1218 7ffd9bd42e29 1211->1218 1216 7ffd9bd42e65-7ffd9bd42e67 1212->1216 1219 7ffd9bd42d70 1213->1219 1220 7ffd9bd42dea-7ffd9bd42dec 1213->1220 1222 7ffd9bd42e2c-7ffd9bd42e34 1214->1222 1223 7ffd9bd42dac 1214->1223 1224 7ffd9bd42e68-7ffd9bd42e70 1216->1224 1227 7ffd9bd42de7 1217->1227 1225 7ffd9bd42eaa-7ffd9bd42ec2 1218->1225 1226 7ffd9bd42e2a 1218->1226 1228 7ffd9bd42d72-7ffd9bd42d9a 1219->1228 1229 7ffd9bd42db7-7ffd9bd42dce 1219->1229 1220->1224 1231 7ffd9bd42dee 1220->1231 1221->1212 1230 7ffd9bd42e35-7ffd9bd42e4c 1222->1230 1232 7ffd9bd42dad-7ffd9bd42db6 1223->1232 1233 7ffd9bd42df3-7ffd9bd42e0a 1223->1233 1235 7ffd9bd42e71-7ffd9bd42e79 1224->1235 1226->1235 1236 7ffd9bd42e2b 1226->1236 1227->1221 1237 7ffd9bd42de9 1227->1237 1244 7ffd9bd42d9c-7ffd9bd42d9e 1228->1244 1245 7ffd9bd42e0b-7ffd9bd42e18 1228->1245 1229->1207 1230->1210 1231->1230 1238 7ffd9bd42df0 1231->1238 1232->1229 1233->1245 1243 7ffd9bd42e81-7ffd9bd42e87 1235->1243 1236->1222 1237->1220 1238->1233 1247 7ffd9bd42e89-7ffd9bd42e92 1243->1247 1246 7ffd9bd42e1a-7ffd9bd42e1c 1244->1246 1248 7ffd9bd42da0 1244->1248 1245->1246 1245->1247 1249 7ffd9bd42e1e 1246->1249 1250 7ffd9bd42e98-7ffd9bd42e9d 1246->1250 1248->1227 1251 7ffd9bd42da2-7ffd9bd42daa 1248->1251 1249->1216 1252 7ffd9bd42e20-7ffd9bd42e25 1249->1252 1253 7ffd9bd42e9f-7ffd9bd42ea3 1250->1253 1254 7ffd9bd42ee7-7ffd9bd42f31 1250->1254 1251->1214 1255 7ffd9bd42e26-7ffd9bd42e28 1251->1255 1252->1255 1256 7ffd9bd42ea4-7ffd9bd42ea8 1253->1256 1260 7ffd9bd42fe0-7ffd9bd4301a 1254->1260 1261 7ffd9bd42f37-7ffd9bd42f3a 1254->1261 1255->1218 1255->1256 1256->1225 1271 7ffd9bd42fb7-7ffd9bd42fcf 1260->1271 1272 7ffd9bd4301c-7ffd9bd43038 1260->1272 1261->1260 1262 7ffd9bd42f40-7ffd9bd42f41 1261->1262 1264 7ffd9bd42f42-7ffd9bd42f4b 1262->1264 1269 7ffd9bd42f4d-7ffd9bd42fa2 1264->1269 1275 7ffd9bd42fd6-7ffd9bd42fdf 1269->1275 1285 7ffd9bd42fa4-7ffd9bd42fb6 1269->1285 1271->1275 1277 7ffd9bd4303f-7ffd9bd43055 1272->1277 1280 7ffd9bd43057-7ffd9bd43069 1277->1280 1281 7ffd9bd4306b-7ffd9bd43071 1277->1281 1280->1281 1285->1271
                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fc04e846b2dc94df7b16b57214ee2bb676107d3488255885d8ba52c7d46b395c
                            • Instruction ID: 7910494459f521e18f56f9fe9eec2c27cf0ba53c5508c98b89f3fd621622f3e7
                            • Opcode Fuzzy Hash: fc04e846b2dc94df7b16b57214ee2bb676107d3488255885d8ba52c7d46b395c
                            • Instruction Fuzzy Hash: 41F19062B2E98D0FE779DBAC88652A477D2FF96310B4501BAD04ECB1E3DD1CAD068341
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 72fc55312942d625372e6a1f3c884dde135e5d39bbd43caf93efd3edbe0b979e
                            • Instruction ID: 7f173831454e5ea993ffedc20af021de2f5a4155631cfa4521815d3f0188f241
                            • Opcode Fuzzy Hash: 72fc55312942d625372e6a1f3c884dde135e5d39bbd43caf93efd3edbe0b979e
                            • Instruction Fuzzy Hash: 50D1823071990D4FDB98EF2DC4A9A7973D2FF99314B1211B9E44EC72A6DE28EC428741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e51b34cf893c0756c29bf78fe5a0fbcb9dbe72e3d1ab686036a25c9fab8a1b72
                            • Instruction ID: 0ae8db8a535efb86853d2d78414864e976d779a7aa1bf0c352e9ac3280b28de3
                            • Opcode Fuzzy Hash: e51b34cf893c0756c29bf78fe5a0fbcb9dbe72e3d1ab686036a25c9fab8a1b72
                            • Instruction Fuzzy Hash: 3FD1A731B0990D8FEBA8EB68C495BB977E2FF98310F055179D05EC72E2DE34A9418B40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 951e76d5f8a03fb93505af1b5204b5b980b5a0f47ff937dbbc783b84d3d30095
                            • Instruction ID: 31b6454f3b8b76884c9aa27e9fce079818550b773cb6ea561f66edcbe61b1a11
                            • Opcode Fuzzy Hash: 951e76d5f8a03fb93505af1b5204b5b980b5a0f47ff937dbbc783b84d3d30095
                            • Instruction Fuzzy Hash: 68C1C420B0A60E4FEBA8DB6984657B873D2FF94344F515179D44FC72E3DE2DAA468700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8bc6697cc7e85fdde9ca40ded2b868d16e57ea004b2c2802f0a22b477353fc4b
                            • Instruction ID: d6dd8bd9e5fe715df399e833b2af324b6b0157b92c0bf2eb48676e915542ffdb
                            • Opcode Fuzzy Hash: 8bc6697cc7e85fdde9ca40ded2b868d16e57ea004b2c2802f0a22b477353fc4b
                            • Instruction Fuzzy Hash: 30B1A131B19A0D4FDB68EB6CD4616B973E2FF88324F114279E45EC32D2DE35A9028740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4018659cad2b94386b9387c890fa8703aa2617f1a51b570aeb906c150851f40a
                            • Instruction ID: e4c650849161e861719caa76a18dcbb4eae06040bc5b2603513a414f6f74eee6
                            • Opcode Fuzzy Hash: 4018659cad2b94386b9387c890fa8703aa2617f1a51b570aeb906c150851f40a
                            • Instruction Fuzzy Hash: E2A19220B0A50E4FEBA8DA6D84697A873D2FF94340F55517DD48FC32E3DE29AA468740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7e3047ff9666db960cea3f5f557fd993263bcf216ed4bf9e1edfe35eb54e0e93
                            • Instruction ID: bbabbe6df27f0e246da89ea58e60a05185f2aab5a2934c73fc9d27cb809a96e3
                            • Opcode Fuzzy Hash: 7e3047ff9666db960cea3f5f557fd993263bcf216ed4bf9e1edfe35eb54e0e93
                            • Instruction Fuzzy Hash: 17A1A420B0990E4FEBA8DB5D84A97B873D2FF98340F515179D44FC32E3DE69AA468740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 28d9a8a9eebcdf16c69404d2731d2963dd7e6c0c5ea56d9c27b02b538bdc357b
                            • Instruction ID: ac5165f9403ac1a985742d619343df400dd6133f84fdf96c9ec3c11a1289de9a
                            • Opcode Fuzzy Hash: 28d9a8a9eebcdf16c69404d2731d2963dd7e6c0c5ea56d9c27b02b538bdc357b
                            • Instruction Fuzzy Hash: FE815B3171E94D0FE7A8EB6C986567537D2EF99320B0501BAE08EC72E7DD25EC428781
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c2b8537067b74d5064a989bee86dae0e5bebacf5f956159e43e139227f8eeee7
                            • Instruction ID: f36c0812a7b1223af53ffd290dd79fd5e94e34a1d58554f8a7fa02328fa72dae
                            • Opcode Fuzzy Hash: c2b8537067b74d5064a989bee86dae0e5bebacf5f956159e43e139227f8eeee7
                            • Instruction Fuzzy Hash: 1C917120B0990D4FEBA8DA5E84A97B873D2FF98344F515179E44FC32E2DE29EA458740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 79deb672ab4a64c9b90901986dc8387566a4eb5553d5276b8e879864ced75a93
                            • Instruction ID: 78b61c4a3b2218819a45992396124d1ea074e57509e34e0a5f5e8330e02caf64
                            • Opcode Fuzzy Hash: 79deb672ab4a64c9b90901986dc8387566a4eb5553d5276b8e879864ced75a93
                            • Instruction Fuzzy Hash: 84918120B0990D4FEBA8DA5E84A97B873D2FF98340F515179E44FC36E2DE29EA458740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fcf40eb76a0614675fe6a9fcd2a455f872a1646debc777e6a19b8f6572d43cef
                            • Instruction ID: 0dcf225819433a7274c2499191fb9b2a1df78be36b75c7fe2bc34f5650a4ce90
                            • Opcode Fuzzy Hash: fcf40eb76a0614675fe6a9fcd2a455f872a1646debc777e6a19b8f6572d43cef
                            • Instruction Fuzzy Hash: 79918120B0990D4FEBA8EA5E84A97B873D2FF98340F515179E44FC36D2DE29EA458740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59697395bc00df2f1ab05b98abb66d415601773b3f1b1bd5b0670e0256736772
                            • Instruction ID: 10d0d46df3f1160035b7415075cf12524aee1c967ef02a9e49884b9c1e6b4cb5
                            • Opcode Fuzzy Hash: 59697395bc00df2f1ab05b98abb66d415601773b3f1b1bd5b0670e0256736772
                            • Instruction Fuzzy Hash: 50918120B0990D4FEBA8EB5E84A97B873D2FF98340F515179E44FC32D2CE29EA458744
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 05b62b24139207ff59ea2c1c21fc205ee1e4b4ca18dfd9ba8581e19357ccab7a
                            • Instruction ID: 98ec1eb851f6c2398c9c1daf4e31422169726345795afbfeda441b37c1630e8e
                            • Opcode Fuzzy Hash: 05b62b24139207ff59ea2c1c21fc205ee1e4b4ca18dfd9ba8581e19357ccab7a
                            • Instruction Fuzzy Hash: 10918020B0990D4FEBA8EA5E84A97B873D2FF98340F515179E44FC32D2CE29EA458740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 578790a581a9b07c417b99096986bd9cbe2cd1b738bcd1945e50d731e576caf4
                            • Instruction ID: 1bc62645a38bb57432e3f767c35b42d07706899b581c8db2aace97ab2b70dff3
                            • Opcode Fuzzy Hash: 578790a581a9b07c417b99096986bd9cbe2cd1b738bcd1945e50d731e576caf4
                            • Instruction Fuzzy Hash: B5918120B0990D4FEBA8DB5E84A97B873D2FF98340F515179E44FC32D2DE29EA458740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ca7a4e55e28e1f67e59de95cae5eb244f6f9049938b539e95753e9c336a45af5
                            • Instruction ID: 26046f3697a67af83bf57cb4a3b4054dbaa7e977ce9c61fd96117a0dca2be198
                            • Opcode Fuzzy Hash: ca7a4e55e28e1f67e59de95cae5eb244f6f9049938b539e95753e9c336a45af5
                            • Instruction Fuzzy Hash: 23918120B0990D4FEBA8DA5E84A97B873D2FF98340F515179E48FC32D2DE29EA458744
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 485c8a34b54b68cbff83bd24d4097a8a4a370a194e4a14e48fa719d412b12210
                            • Instruction ID: a323b79d9d08874a273036c013b61966b4991b2b68c7664e04709b5705000897
                            • Opcode Fuzzy Hash: 485c8a34b54b68cbff83bd24d4097a8a4a370a194e4a14e48fa719d412b12210
                            • Instruction Fuzzy Hash: F981C030B09A4E4FEBA9DF688864AB577E2EF95300F0604F6D45EC71E6DA28AD41C741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8ed9259d99b137641317bf79e3f027c31bc0a025b835ee606b96e5d0662e81d4
                            • Instruction ID: ca754318934e812bcccd1c7beeb3cf4e7884066dcd4b50e177acf8a8dc230d6d
                            • Opcode Fuzzy Hash: 8ed9259d99b137641317bf79e3f027c31bc0a025b835ee606b96e5d0662e81d4
                            • Instruction Fuzzy Hash: D971927171D94D4FDB98EF6CC4A4AA977E2FF98314B0506BAE04EC72E6DA24EC018741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: df64bb9227cde9b0c43ea6907d7e661e77ff30c31370ca849068224cad96375e
                            • Instruction ID: e9c66e808de843f51b41b84051f8f890046d5a9964ff8dd4bc5da3a2d7eb802e
                            • Opcode Fuzzy Hash: df64bb9227cde9b0c43ea6907d7e661e77ff30c31370ca849068224cad96375e
                            • Instruction Fuzzy Hash: 2161F461B1A94E4FE7A9AB6C846167623D3FF99350B4511FDE04FC72E6CE29BC428340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f18cec5f572d00c568be40a6d9a1aad45d5f3d8649863998d68a910c39444a74
                            • Instruction ID: 5d96db81290ae3d896a25f826678b5a89d39eb40fa7da4ed1ef7fd8206df7854
                            • Opcode Fuzzy Hash: f18cec5f572d00c568be40a6d9a1aad45d5f3d8649863998d68a910c39444a74
                            • Instruction Fuzzy Hash: 5351B571B19E4D4FEBE9AF6C40A46B463C2EF98384B54017AD41EC32EBDD29A8428700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9e33a629c2a9279ef77e3c26728b28d18d24a9a1b0e1c9758fed2b443e3cee9f
                            • Instruction ID: 04f8e73efaa57b8325fb0fced26f8716728a6a3667cbe0cfc8e8a7009364e116
                            • Opcode Fuzzy Hash: 9e33a629c2a9279ef77e3c26728b28d18d24a9a1b0e1c9758fed2b443e3cee9f
                            • Instruction Fuzzy Hash: 6A51F730B0DA4D4FEB6DAB6C94506757BD1EF96338F11127ED48EC31E6DD19A8028781
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4375963d3e5910bfa0419d45db1dd6ec9402505ad593d96b0da4c062b62d639f
                            • Instruction ID: bc29dcaf06f58fb1fdd49db534d6a46e04fb90d7682c7532b65a0f7ef64dab8a
                            • Opcode Fuzzy Hash: 4375963d3e5910bfa0419d45db1dd6ec9402505ad593d96b0da4c062b62d639f
                            • Instruction Fuzzy Hash: 75514862B0EA8A0FE77DCB6844655A47BD2EF94350B0942BED08ACB1E3DD586985C381
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8894eb26c1fd615560eea83dab913f24b2d641c356076ef245934749f5449d03
                            • Instruction ID: ae04179e90d562c1e0621889bbc012902c08e35b7b73ff86a9fa7e54a9f34dbf
                            • Opcode Fuzzy Hash: 8894eb26c1fd615560eea83dab913f24b2d641c356076ef245934749f5449d03
                            • Instruction Fuzzy Hash: B9517C30B0AA4E8FEBA8DF58C461BA937A1FF45315F4501B9E40EC71E2CB29A955CB01
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c57e369fb119b4b652a7a1a78036d2afb6fbe169d5b9d1934ab21db4e173ce2a
                            • Instruction ID: a93e7e1252228dadc6fc678f67ff7024560c4a19e27591a88be1ce3baaf9c9fc
                            • Opcode Fuzzy Hash: c57e369fb119b4b652a7a1a78036d2afb6fbe169d5b9d1934ab21db4e173ce2a
                            • Instruction Fuzzy Hash: 9A41DF71A08A4D8FDB58DF6898596F97BE1FF98311F04427FE04ED32A1DB34A9418B81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8a472e847f882ec7c716c2ab8c28f800cb4de7418412879b6a9d55b8088018fd
                            • Instruction ID: 51b33776b7876f7add24fc2ee99baa88e526f818f1f691ee5955129a6b47e295
                            • Opcode Fuzzy Hash: 8a472e847f882ec7c716c2ab8c28f800cb4de7418412879b6a9d55b8088018fd
                            • Instruction Fuzzy Hash: CA41B23170DC1D4FEAA8FA5CE4A0AB433D1FF5932471110BAD44EC72A6DE19EC828B81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa74ad8b524ad97d272067ab7e62f56682b83d1dc50cc9e0d73e49758f49dbbc
                            • Instruction ID: 91a8fb811484ab31afe4d0c3a58fbdbf9932726236d9d7bd2a24da083f0c67f3
                            • Opcode Fuzzy Hash: aa74ad8b524ad97d272067ab7e62f56682b83d1dc50cc9e0d73e49758f49dbbc
                            • Instruction Fuzzy Hash: 5B41E561B1FA890FE7A6973C84646657FE2DFA6300B0944FAD4CECB1F3D919AD858301
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bddf3d5ca2f23d8a6ed2d2e483d7bfa5b7d30844a30add9d271b9528bd827344
                            • Instruction ID: 29b08222ac2cfaefcba04dd53c4942400d458ca862f9a7e16bbbc725884942c6
                            • Opcode Fuzzy Hash: bddf3d5ca2f23d8a6ed2d2e483d7bfa5b7d30844a30add9d271b9528bd827344
                            • Instruction Fuzzy Hash: 39418072B1FA8E0FD7AA97B844505A037D2EF9A324B4501BBC44DCB1E7DD299946C340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 84a87d391cb3b2de223e2e787ef0294d47dae6f29d58ff662500f0661ebd0f79
                            • Instruction ID: 860560bd97d49bc7e5ef53da0ba0232220fea0981920831b1a5a24f39f5adc4f
                            • Opcode Fuzzy Hash: 84a87d391cb3b2de223e2e787ef0294d47dae6f29d58ff662500f0661ebd0f79
                            • Instruction Fuzzy Hash: 4741E563A1D5550AD329BABCACA24E437509F2A63EB0986F3E4BE8E0D7DD1C6440C295
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59dd767c7754c066465a84175298d3617a27e42566f531ce85bacdf1c45b0512
                            • Instruction ID: ab90123f196146f18499607c4bae876d804e4c34950c852bfd963a95b331fbaf
                            • Opcode Fuzzy Hash: 59dd767c7754c066465a84175298d3617a27e42566f531ce85bacdf1c45b0512
                            • Instruction Fuzzy Hash: A841BE71A08A4C8FDB58DF58D855AE9BBE1FF99310F04426EE04DD32A1DB34A912CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5b8a43bc940097f7c1f9089a45a36cb744e290c514cdb351ef9a7bd0aedbd906
                            • Instruction ID: 77c677d3f9221ebef8ae211f6a754bd0e0908596acbe0e7cd6fc17373a3b9768
                            • Opcode Fuzzy Hash: 5b8a43bc940097f7c1f9089a45a36cb744e290c514cdb351ef9a7bd0aedbd906
                            • Instruction Fuzzy Hash: 46315D22B1EA8D0FF36C966C6C565B47BD2DF9537070642BAE09EC71E7DC19AD028340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e1b65f97734ce6f6cf91a093795a69e16130769552091f9403c27c8e446e48e5
                            • Instruction ID: ec897b7dfc581d2a3501df4836ef5bcd080e6573994834c961567c246f618638
                            • Opcode Fuzzy Hash: e1b65f97734ce6f6cf91a093795a69e16130769552091f9403c27c8e446e48e5
                            • Instruction Fuzzy Hash: E3312721B1FB8E0FEBA9DA6C84649617BD2EF65340B0950BED44DCB1E2DE24D9818741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2f2d13d69ce5e39da673e5963fda4a087f3356c4362d87685dc57c2923bcb4ec
                            • Instruction ID: 2276e982d86d60b459c8211db0d9cf0a759b87a1fa75ddfe0ff66e0c11eeb85c
                            • Opcode Fuzzy Hash: 2f2d13d69ce5e39da673e5963fda4a087f3356c4362d87685dc57c2923bcb4ec
                            • Instruction Fuzzy Hash: A8312C21B3DA8E0FE758A79888B16F937A1EF59314F010277E48FC71D7DD2869058351
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fdceb7bc8bf36ec280829af7292a3f5123f8cdbcee076dacf1f83882deec266d
                            • Instruction ID: 8b9b181f2091b606b3842d33ea069bc93255fcf90c1ee60822cd61addf388936
                            • Opcode Fuzzy Hash: fdceb7bc8bf36ec280829af7292a3f5123f8cdbcee076dacf1f83882deec266d
                            • Instruction Fuzzy Hash: 8431E83171C90D4FFB9CFB6C9455A7573D2EF95324B011179E85EC32E6ED28A8114781
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c33e239d4163255f7e6a1d2b60a800ef3a793fe93d7b3f17a7b9b4005abd8080
                            • Instruction ID: 43bc1d12736a67eba8b57e4746905f5b14051aeb4b6933a6d62445f6c02e9d63
                            • Opcode Fuzzy Hash: c33e239d4163255f7e6a1d2b60a800ef3a793fe93d7b3f17a7b9b4005abd8080
                            • Instruction Fuzzy Hash: A8312631A0E98B5FE77D836894B467476D2EF46310F5A50BAC84FC71E2DE18EE818741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3df99508aba0fae87e8ba62c10f761fe767d0b17a303724758aa7d98808608c7
                            • Instruction ID: 70dea2f9c42605ed4d7ccdbfaaec38726bc90071e10efcc64a185eb72a1a4c10
                            • Opcode Fuzzy Hash: 3df99508aba0fae87e8ba62c10f761fe767d0b17a303724758aa7d98808608c7
                            • Instruction Fuzzy Hash: 9511EB23B1EE4D0BE3FCA65C68555B537C3EF9876071612BAE45EC72D6DC14BC424280
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 871b1f300397e81551f6ddd04f6653b9e5cb68b3ff2e888cf242318e60a1af3e
                            • Instruction ID: db87b827d632f9b129411e4e825d080a38e34e92b060a4eade503fc3e9c2c1d6
                            • Opcode Fuzzy Hash: 871b1f300397e81551f6ddd04f6653b9e5cb68b3ff2e888cf242318e60a1af3e
                            • Instruction Fuzzy Hash: E5110A22B1EE0D0BE3FCA65C68555B533C3EF9836071612BAE45EC32D6EC14BC424280
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 15d306e300ab19d9a866b1bb30f5b6352f8144b87aaf74db5aabb2dfde5da812
                            • Instruction ID: 27a4762c755784c43e5fcb3a3cf5eee9b0aa7bbe5a8b6ed3404f78c86b246cb3
                            • Opcode Fuzzy Hash: 15d306e300ab19d9a866b1bb30f5b6352f8144b87aaf74db5aabb2dfde5da812
                            • Instruction Fuzzy Hash: D521D131A08A0C8FDB58EF6CC4556A973E2FF89325B10013EE40DD3292CB31E812CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 86da5ca74f715cdc76ff87a1b7bd6541549851b9872fd9048d73e462f9c79ec3
                            • Instruction ID: 9138ccd4f9c5c7a0f9c3744158c8ae43456f1e5868cada048a021e938edcd138
                            • Opcode Fuzzy Hash: 86da5ca74f715cdc76ff87a1b7bd6541549851b9872fd9048d73e462f9c79ec3
                            • Instruction Fuzzy Hash: CF219041A4F6DA0FE35B67B80C394A53FA19F9715071E41FBD086CB4F3D84C494A8362
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2945f4dc1968ddb7f60036fb42f9b540a951f22a9a7425207e14435ae80399b2
                            • Instruction ID: 7b13a707b9f72c0fc2bb1e5c811b634f29cc118bb08ee0f24a4b5d3258fb25e2
                            • Opcode Fuzzy Hash: 2945f4dc1968ddb7f60036fb42f9b540a951f22a9a7425207e14435ae80399b2
                            • Instruction Fuzzy Hash: 75217B93B1EE8A0FE79D926804667B467C2FFA8350B0805BED08FC71E7ED18B8064300
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9f5a59b4c79cd79e585651f8f3c251af60f2de52077c88096fc4af672b04c15e
                            • Instruction ID: b23ba426657fd26f5e4a57d648b98c04230befe596d6e20d46fdbb72f6279b4a
                            • Opcode Fuzzy Hash: 9f5a59b4c79cd79e585651f8f3c251af60f2de52077c88096fc4af672b04c15e
                            • Instruction Fuzzy Hash: 6721023158F6CA1FC346A7B888259D57FE5EF8B12030D02FAE089CB5A3C91C9847C361
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1329c3421ddfb9a6296552c99b4fa8519dab1f22082a91f990c96cb2a85b1a2d
                            • Instruction ID: a7c6e5c2e617384af81fade11770ecee6bfbd59d3c163fceae2f77fc56c0e1bf
                            • Opcode Fuzzy Hash: 1329c3421ddfb9a6296552c99b4fa8519dab1f22082a91f990c96cb2a85b1a2d
                            • Instruction Fuzzy Hash: C0218B3061CA0D8FDB98DF1CD4556A9B7E2FF98321F10113EE48AD32A1CE32E8428B41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2cc6ed693ddfd1ce69d00a8b8e1d6eaaea5b10679f2eb1e95322a8442906c5bf
                            • Instruction ID: 92e7ef446ffc889eb6fcc55de62fd66ede52ab4c85d2feabfd85679ca4ea3f51
                            • Opcode Fuzzy Hash: 2cc6ed693ddfd1ce69d00a8b8e1d6eaaea5b10679f2eb1e95322a8442906c5bf
                            • Instruction Fuzzy Hash: F121C222B35A4E0BE768A79884A16FA73D2EF98314F40463AD44FC71DBDD68A9024380
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c873139c9716f49fdd261c66c2166b41a479430f423fae2ae494a5df4000723d
                            • Instruction ID: 01677cecb82c3b831fdad8545641544dd49846f0726026625319e4a4b37e1d2d
                            • Opcode Fuzzy Hash: c873139c9716f49fdd261c66c2166b41a479430f423fae2ae494a5df4000723d
                            • Instruction Fuzzy Hash: 4B012F32A2D6CD0FD7599BA448650E97FF1EF96210B4602FBE059CB0D3DE6465068340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 14c939784502e6817093b0604cd0defa557c0ecf6870b2726ce3e611574e27e2
                            • Instruction ID: eea30179425957cf865a089c9fded8899931da1644dfe88ae942a99aea6f39c1
                            • Opcode Fuzzy Hash: 14c939784502e6817093b0604cd0defa557c0ecf6870b2726ce3e611574e27e2
                            • Instruction Fuzzy Hash: 4B01E56258F3D21FC3039BB48C289863FA99E9716030E85EBE085CB4B3D04D490BC762
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9cd7758b12b945ccc8c4e66c45a6dc71daf738c2878b21df080e9102cd57dc4a
                            • Instruction ID: cda0d6e570507073f5a78e0d3f545afe64e485bb25051bc59a15fbc26821d53d
                            • Opcode Fuzzy Hash: 9cd7758b12b945ccc8c4e66c45a6dc71daf738c2878b21df080e9102cd57dc4a
                            • Instruction Fuzzy Hash: 0401B162B16E4A0BD7ADEA38446057962D3FFD834070845BE901FC72D6CF29A9064700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 08b1c7fc1dd31703d20f8bf1152c28a276ea5f4997f785a93b41e63581658655
                            • Instruction ID: 2ce77718f8058d82f3a5c3c71920e2a5f9445158860124a729904439146bc9a5
                            • Opcode Fuzzy Hash: 08b1c7fc1dd31703d20f8bf1152c28a276ea5f4997f785a93b41e63581658655
                            • Instruction Fuzzy Hash: 7D01F96190E6494FE756E32894552AA7FD1DFC5220F0D066ED08DC60F2CD584AC58382
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59f303d16d1f4e57a188a22a3357a375541673fceaf84793d395288fefa90ade
                            • Instruction ID: d71da1ab8bbfc32d3fa076bca6ecd36b5855878d8e641e67ce9be621df67a4c9
                            • Opcode Fuzzy Hash: 59f303d16d1f4e57a188a22a3357a375541673fceaf84793d395288fefa90ade
                            • Instruction Fuzzy Hash: 6AF0F62291DACC2FDB5597A488655E67FB1EF86300F8601EBD498DB1A3C9286605C341
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 58dfe3d46efe15d6b9b18ae78697e3b818f707003424cca274444dcaffc2f456
                            • Instruction ID: 07a3ecea5229457108ea1dc37640ebb3397ee80780ae23f66338107eae31a5a6
                            • Opcode Fuzzy Hash: 58dfe3d46efe15d6b9b18ae78697e3b818f707003424cca274444dcaffc2f456
                            • Instruction Fuzzy Hash: DFF0E921B29A4D4BE7A8AB3C541127133D1EF99314B5606B9D49ED71B2DF28ED024341
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                            • Instruction ID: 353e0bb725f200bd6b54764fe31fb29fb9f16c7127775dfe6d6e3bb214501ae9
                            • Opcode Fuzzy Hash: 70cf21d9e70ce76508cf83898484feef363597d488487a1893d6b1d777935134
                            • Instruction Fuzzy Hash: E0F0A77150D50D5FD728EF59EC565EB37A4FF85230F00023AF45D82152E6756962C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b2ddd055393d444eddee6397fbf68ba3c3544f40b13fa01678ca3940347b0742
                            • Instruction ID: fc384e6c237297fc249001a1f5cfc36d6e11c0266d16076b562559b549d9960a
                            • Opcode Fuzzy Hash: b2ddd055393d444eddee6397fbf68ba3c3544f40b13fa01678ca3940347b0742
                            • Instruction Fuzzy Hash: 0EF0F631A2E6CC0FE7599BB448660E97FB1EF86210F4602E7E459DB0A3DE6859458300
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 892cd3458a3e502c3033daf4db22aaa917df622daddf30b7ab717899cab54aa4
                            • Instruction ID: 8b52280ea69864d931fd68a4115038cfd0c251ae31749f486bbdb48bc522e3b4
                            • Opcode Fuzzy Hash: 892cd3458a3e502c3033daf4db22aaa917df622daddf30b7ab717899cab54aa4
                            • Instruction Fuzzy Hash: 49D02B43F0E18C06EBA0A15868501F96385DB92114F64427AC05A43057DC1A91058701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Non-executed Functions

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a9cd676db17d0667adb9fd5b8c171563a1341fbd3b773f8741a5df9ab8669a1e
                            • Instruction ID: ec2a9eb2d27d571b3bfd7972f86f5bf8dcec8f7328815fb1a1348d17dfe58b4d
                            • Opcode Fuzzy Hash: a9cd676db17d0667adb9fd5b8c171563a1341fbd3b773f8741a5df9ab8669a1e
                            • Instruction Fuzzy Hash: 8BE12016A0D1A24AE729B6BCACB28E52B509F1623FB0D47F3F4EE4D0D79D0C2586C195
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.2911015791.00007FFD9BD40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BD40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffd9bd40000_Client.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: edb834bd7567410cb542e1ef1963193211126117ef225793434740dd0e2deb5f
                            • Instruction ID: 7c9db82c34ac254dc112bf0fba6ac5abe346235209ca958f1ba75142d2b39c8f
                            • Opcode Fuzzy Hash: edb834bd7567410cb542e1ef1963193211126117ef225793434740dd0e2deb5f
                            • Instruction Fuzzy Hash: 94D12016A0D1A246E729B6BCACB28E53B509F1623FB0D87F3F4EE4D0D79D082586C195
                            Uniqueness

                            Uniqueness Score: -1.00%